Continuity check monitoring for microchip exploitation detection
Apparatus, method and program product detect an attempt to tamper with a microchip by determining that an electrical path comprising one or more connections and a metal plate attached to the backside of a microchip has become disconnected or otherwise altered. A tampering attempt may also be detected in response to the presence of an electrical path that should not be present, as may result from the microchip being incorrectly reconstituted. Actual and/or deceptive paths may be automatically selected and monitored to further confound a reverse engineering attempt.
Allowing degraded play of protected content using scalable codecs when key/license is not obtained
Embodiments are directed towards enabling a portion of a protected content stream to be played in a degraded quality or experience at a client device when a key and/or license for some other portion of the content stream is unobtainable, or is not obtained by the client device. A content stream has a plurality of layers, with a baseline layer having a lowest quality level of the plurality of layers that is unencrypted, while at least one other layer is encrypted. When the key to decrypt the encrypted layer(s) is unobtained, at least the baseline unencrypted layer is allowed to still play at the client device.
Techniques for in-app user data authorization
Techniques for in-app user data authorization are described. An apparatus may comprise a processor circuit, a permissions component, and a token component. The permissions component may be operative on the processor circuit to receive a request from an application to perform a task on a device and to return a response to the request to the application based on active permissions for the application. The token component may be operative on the processor circuit to manage a token database and to determine the active permissions for the application based on the token database. Other embodiments are described and claimed.
Region-based sharing of pictures
An embodiment of the invention provides a method for sharing digital images on an image-sharing application, wherein a digital image is received from a user, the digital image including a first access setting defined by the user. A user-defined select region is identified on the digital image with a processor, wherein the select region includes a second access setting. Access to the digital image is permitted with an access controller based on the first access setting; and, access to the select region is permitted with the access controller based on the second access setting. In at least one embodiment, the digital image is displayed only to a first group of individuals based on the first access setting; and, the select region is displayed only to a second group of individuals based on the second access setting.
Online privacy management
A privacy management system (PMS) is disclosed for a Chief Privacy Officer (CPO) or other user to use in monitoring and/or controlling in realtime the flow of data (e.g., outflow) about the user and his/her online experience. The PMS may employ pattern recognition software to evaluate analytics data and potentially block private information from being sent within the analytics data. The PMS may provide a dashboard displaying a whitelist and/or blacklist indicating what destinations/sources are blocked or allowed as well as private information settings indicating what types of private information should be blocked. The PMS includes browser-client scripting code and may also include a PMS-certified verification icon and/or lock and unlock icons for display on webpages being monitored/controlled in realtime by the PMS.
System and method for obscuring displayed information
A method includes obtaining information from an application to display to a user of a device having a screen from which information may be viewed by more than one person, generating a cover to selectively obscure sensitive information contained in a portion of the screen displaying the information, and receiving user input to selectively invoke or remove the cover relative to sensitive information to obscure display of the sensitive information on the screen.
Method and system for digital rights management of documents
A method and system of encrypting and decrypting documents and recipient rights.
Efficient securing of data on mobile devices
A mobile device and associated method and computer-readable medium, wherein the device is configurable for data protection readiness. A preparation module is configured to perform preprocessing to prepare the mobile device for data protection readiness, the preprocessing includes: indicating certain items of data stored in the data storage arrangement which are of personal importance to an owner of the mobile device; indicating criteria that defines a situation for which the items of data of personal importance are to be secured; and indicating a set of actions to be carried out to secure the items of data of personal importance. A protection module is configured to monitor for an occurrence of the situation for which the items of data of personal importance are to be secured based on the criteria indicated by the preparation module, and to execute the set of actions indicated by the preparation module in response to a detection of the occurrence of the situation.
Method and apparatus for desktop product license portability with user identity subscription using durable tokens
A method, apparatus and computer program product relating to software license tokens is presented. A client system requests launching of a software application and retrieves a first software license token associated with the software application. The client system determines whether the license token associated with the software application is valid, wherein when the license token is valid, the client system launches the software application. When the license token is not valid then the client system requests a replacement license token. The client system receives the replacement license token and stores the replacement license token. The client system then retrieves the stored license token and determines whether the license token is valid. When the license token is valid, then the software application is launched, when the software license token is not valid then the client system refrains from launching of the software application.
Mitigating forgery for active content
Cross Site Request Forgery (CSRF) and other types of fraudulent submission can be mitigated using state information that typically is already maintained for various users. Each submission requiring authentication can include a state identifier (ID). The state ID can be compared to a corresponding secure state ID stored in a secure location, such as in a secure token or cookie or in a variable on a page that can only be accessed by code executing in the same security context as the site to which the request is made. If the received state ID is valid and matches the secure state ID, the submission is processed. Otherwise, an interstitial element is generated to prompt the user to confirm the prior submission. A subsequent confirmation submission confirming the prior submission and containing the proper state ID can be processed. If no such confirmation is received, the submission is not processed.
Multi virtual machine architecture for media devices
A software computing based environment for providing secured authentication of media downloaded from a network or loaded from a media player includes two peer-mode operating virtual machines. The low-level virtual machine provides decoding and decryption functions whereas the high-level virtual machine provides application level functions such as user interface, input/output.
Method and system for associating database content for security enhancement
A system and method for associating database content for security enhancement is provided, the method being applicable to a system comprising a computer configured to process a data management application and to store data in databases. According to one embodiment of the method according to the invention, the application uses an encryption key to encrypt data. The application stores the encrypted data in two or more databases. The databases may comprise a system database for storing encrypted user access data and one or more results databases for storing patient data. Databases may be stored locally, remotely, or both locally and remotely.
CVSS information update by analyzing vulnerability information
An automated system for automatic update of a Common Vulnerability Scoring System (CVSS) score, the system including vulnerability information analyzing functionality to analyze preexisting vulnerability information, the preexisting vulnerability information relating to at least one of at least one vulnerability and at least one attack vector thereof, the at least one vulnerability having a preexisting CVSS score, the preexisting CVSS score being based at least partially on the preexisting vulnerability information, vulnerability information extraction functionality, responsive to the analyzing preexisting vulnerability information, to extract new vulnerability information, the new vulnerability information relating to the at least one of the at least one vulnerability and the at least one attack vector thereof, and CVSS score updating functionality to employ the new vulnerability information to update the preexisting CVSS score.
Content-checking of embedded content in digitally encoded documents
Methods and apparatus for network security content-checking, in particular simplifying the critical element of a content-checker so that it can be trusted and implemented in hardware logic. A method comprises determining whether a digitally encoded document contains any embedded documents; content-checking, by means of at least one hard-ware-implemented content-checker, at least one of the embedded documents separately from those parts of the digitally encoded document within which it was embedded; and releasing a version of the digitally encoded document responsive to the content-checking.
Information processing method, device, and server
Embodiments of the present invention provide an information processing method, device, and server, relating to the technical field of communications, and solving the problem that a user continuously releasing illegal information in the network. The method comprises: receiving network information; determining, according to the network information, a rating result of a network object corresponding to the network information; controlling the network object according to the rating result of the network object corresponding to the network information. Embodiments of the present invention further provide an information processing device and server. The present invention is applied to the network information management.
Apparatus and method for identifying related code variants in binaries
An apparatus for identifying related code variants may include processing circuitry configured to execute instructions for receiving query binary code, processing the query binary code to generate one or more query code fingerprints comprising compressed representations of respective functional components of the query binary code, comparing the one or more query code fingerprints to at least some reference code fingerprints stored in a database to determine a similarity measure between the one or more query code fingerprints and at least some of the reference code fingerprints, and preparing at least one report based on the similarity measure.
Apparatus method and medium for tracing the origin of network transmissions using N-gram distribution of data
A method, apparatus, and medium are provided for tracing the origin of network transmissions. Connection records are maintained at computer system for storing source and destination addresses. The connection records also maintain a statistical distribution of data corresponding to the data payload being transmitted. The statistical distribution can be compared to that of the connection records in order to identify the sender. The location of the sender can subsequently be determined from the source address stored in the connection record. The process can be repeated multiple times until the location of the original sender has been traced.
Automated method and system for monitoring local area computer networks for unauthorized wireless access
The wireless activity in a geographic area containing LAN connection ports is monitored using one or more sensor devices, called sniffers. By analyzing said wireless activity, one or more APs that are operating in said geographic area are identified. The active APs so identified are classified into three categories, namely “authorized” APs (those that are allowed by network administrator), “unauthorized” APs (those that are not allowed by the network administrator, but are still connected to the LAN of interest) and “external” APs (those that are not allowed by network administrator but are not connected to the LAN of interest, for example APs connected to the neighbor's LAN) by conducting one or more tests. The sniffers detect any wireless station attempting to connect to or communicating with the one or more identified unauthorized APs. Upon identifying unauthorized AP and/or intruding wireless station an indication is transferred to the prevention process.
Detecting malicious behaviour on a network
An intrusion detection device (61) for monitoring one or more target devices and detecting malicious software operating on one of the one or more target devices. The intrusion detection device has an interface arrangement (61, 10) comprising one or more interfaces (6110) for receiving inward bound traffic destined for the one or more target devices and outward bound traffic originating from the one or more target devices. The intrusion detection device (61) also includes categorization means (6140) for categorizing incoming service requests destined for one of the one or more target devices as either harmless or potentially suspicious; monitoring means (6150) operable, in respect of each incoming service request identified as being potentially suspicious, to monitor the behavior of the associated target device for behavior indicative of the target device operating as a proxy server; and a notifier (6160) for generating a notification in the event that the monitored behavior is indicative of the device acting as a proxy server.
System and method for limiting exploitable or potentially exploitable sub-components in software components
Approaches for limiting exploitable or potentially exploitable sub-components in software components are disclosed. In certain implementations, a first software component in the component creation environment may be identified. The first software component may include a first sub-component that provides a function that is exploitable or potentially exploitable to compromise the first software component. The first sub-component may be disabled such that the function provided by the first sub-component is not available via the first software component when the first software component is executed. The first software component may be placed in the component repository after the first sub-component is disabled such that the first software component is placed in the component repository without availability of the function provided by the first sub-component. In some implementations, disabling the first sub-component may comprise removing the first sub-component from the first software component.
Systems and methods for detecting covert DNS tunnels
Systems and methods are disclosed for detecting covert DNS tunnels using n-grams. The majority of legitimate DNS requests originate from network content itself, for example, through hyperlinks in websites. So, comparing data from incoming network communications to a hostname included in a DNS request can give an indication on whether the DNS request is a legitimate request or associated with a covert DNS tunnel. This process can be made computationally efficient by extracting n-grams from incoming network content and storing the n-grams in an efficient data structure, such as a Bloom filter. The stored n-grams are compared with n-grams extracted from outgoing DNS requests. If n-grams from an outgoing DNS request are not found in the data structure, the domain associated with the DNS request is determined to be associated with a suspected covert DNS tunnel.
Isolation and presentation of untrusted data
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.
System and method for encrypted smart card pin entry
A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for authentication, a public key to the user input device such that the PIN or password entered by the user is encrypted before transmission to the smart card via a smart card reader. The smart card then decrypts the PIN or password to authorize the user. Preferably, the smart card is configured to provide both a public key and a nonce to the user input device, which then encrypts a concatenation or other combination of the nonce and the user-input PIN or password before transmission to the smart card. The smart card reader thus never receives a copy of the PIN or password in the clear, allowing the smart card to be used with untrusted smart card readers.
Authenticating human interface device
(EN) The invention relates to an authentication device (TK) set to identify itself to a computer (PC) as a native human interface device. It also relates to a system comprising an authentication device (TK) and a computer (PC), as well as to a method to have a computer (PC) recognize an authentication device (TK).
Trusted platform module compliance station
Aspects of the subject technology relate to a compliance station including a test breakout board coupled to a computing device and a trusted platform module, wherein the test breakout board is configured to allow signaling to pass between the computing device and the trusted platform module and a test controller interface coupled to the test breakout board. In certain aspects, the test controller interface is configured to provide signaling to the trusted platform module and to receive signaling from the trusted platform module. A method and computer-readable medium are also provided.
Polymorphic security policy action
In one embodiment, a method of improving the security of a computing device comprises using a computing device that has received one or more messages that have been determined as unauthorized, obtaining a plurality of state data values from one or more of the computing device, the one or more messages, and a second computer; before admitting the one or more messages to a data communications network that the computing device is configured to protect: using the computing device and pseudo-random selection logic, based on the state data values, pseudo-randomly selecting a particular policy action from among a plurality of different stored policy actions; using the computing device, acting upon the one or more messages using the particular policy action; wherein the method is performed using one or more computing devices.
Methods and apparatus for enabling secure network-based transactions
A security process involves log-in and data exchange between a server and a user operating a computerized appliance. The process requires a user-specific token, independent verification of the server execution within a programmed time window. A hash created at the client side is reproduced at the server side from separate data and compared to the client hash. Too much time or incorrect hash denies access.
Mobile out-of-band authentication service
Certain embodiments enable authentication of an application session at a client machine by using authentication values and user-identification values that are received from a mobile communication device. The mobile communication device provides an out-of-band channel for validating the session and enables secure authentication for a variety of applications.
System and method for conveying event information based on varying levels of administrative privilege under multiple levels of access controls
An improved system and method for defining an event based upon an object location and a user-defined zone and managing the conveyance of object location event information among computing devices where object location events are defined in terms of a condition based upon a relationship between user-defined zone information and object location information. One or more location information sources are associated with an object to provide the object location information. One or more user-defined zones are defined on a map and one or more object location events are defined. The occurrence of an object location event produces object location event information that is conveyed to users based on user identification codes. Accessibility to object location information, zone information, and object location event information is based upon an object location information access code, a zone information access code, and an object location event information access code, respectively.
Method and apparatus for routing application programming interface (API) calls
A method and apparatus for routing Application Programming Interface (API) calls from a partner entity to a telephony service provider (TSP) network are provided herein. In some embodiments, a method for routing API calls may include receiving a first message including an API call and a partner API key used to authenticate the partner entity on the TSP network to access a partner API layer disposed on the TSP network, extracting the partner API key from the first message, performing an authentication process to authenticate an identity of the partner entity using at least the extracted partner API key, and routing the first message based on results of the authentication process. In some embodiments, the first message is routed to the partner API layer disposed on the TSP network when the identity of the partner entity is authenticated.
Method and system for secure pairing of wireless devices
A method and system for securely pairing wireless devices, includes deploying a master device in a network environment, and a new device to be securely integrated into the network environment executes an unauthenticated key exchange with the master device. The master device has a security association with a camera system that monitors an operational area where the new device is placed, based on the exchanged key, the master device and the new device each compute a key confirmation code. The camera system learns the key confirmation code from the master device. The camera system watches for devices transmitting the key confirmation code and provides images of such identified devices to the master device, based on an analysis of an image of a device identified by the camera system, an authorization decision is made with respect to accepting the identified device as new device of the network environment.
Authorised data recording
To facilitate recording of data received from a non-trusted source entity, a trusted source entity, for example a user terminal or a user interface, sends to an operational center an authorization message authorizing the non-trusted source entity to send specific information messages. In response to the authorization message, the operational center creates an automatically verifiable authorization condition. When an information message arrives to the operational center, it checks, whether the message fulfills the condition, and if yes, records the data.
Automatic authorization of users and configuration of software development environment
Automatic authorization of users and configuration of a software development environment can include selecting a task defined within a project plan of a software system under development, wherein the task specifies a development tool and a user, and automatically authorizing, using a centralized data processing system, the user to access the development tool.
Automatic authorization of users and configuration of software development environment
Automatic authorization of users and configuration of a software development environment can include selecting a task defined within a project plan of a software system under development, wherein the task specifies a development tool and a user, and automatically authorizing, using a centralized data processing system, the user to access the development tool.
System and method for providing virtual user groups in a network environment
A method is provided in one example and includes communicating an access request to a network element, the access request is associated with network authentication relating to a subscriber. The method also includes receiving an access response that includes a profile associated with the subscriber. The profile can include a group attribute that defines the subscriber as being part of a group of subscribers sharing a network data plan, which defines a data allotment assigned to the group over a specified time interval. In more detailed embodiments, a unique data string sent by an Authentication, Authorization, and Accounting element is received, where the unique data string identifies a full set of subscribers belonging to the group. Data underutilization of a first subscriber is offset by data overutilization of a second subscriber, where a summation of the data underutilization and the data overutilization do not exceed the data allotment assigned.
System and method for remote device recognition at public hotspots
Described are various embodiments of a system and method in which device-identifying data can be used to uniquely recognize and optionally track and report on device activity at one or more hotspot locations by way of the creation and management of a device profile uniquely associated with such devices and stored in a network accessible knowledge base.
Methods and apparatus for reliable and privacy protecting identification of parties' mutual friends and common interests
Systems and techniques for authenticating joint friends of users of wireless devices. An authenticating authority delivers a token to a wireless device for each party identified as a friend of a user of the wireless device, such as through relationships in an online social network. Two wireless devices can use information relating to the tokens to determine information relating to joint friends of the users of the devices, such as the identities of joint friends or simply the numbers of joint friends. Tokens can be further refined to allow for analysis that provides information relating to the degree of intimacy of the relationship between a user and a party identified as a friend.
Systems and methods for the rapid deployment of network security devices
A configuration service comprises a deployment package and a production configuration for a network security device. One or more configuration parameters of the production configuration may be defined by an administrator of the network security device (e.g., the customer). The network security device may be preconfigured with a network address and identifier. The network security device may be configured to automatically request and apply the deployment package at deployment time by use of the preconfigured network address and identifier. The network security device may automatically request and apply the production configuration from the configuration service in response to applying the deployment package.
Uniformly transforming the characteristics of a production environment
Embodiments of the present invention disclose a method, computer program product, and system for generating a secure sandbox environment. A computer identifies components of a production environment that utilizes sensitive information during operation. The components of the production environment can include one or more server computers, one or more storage devices, and one or more applications. The computer receives a security policy that defines what constitutes sensitive information, and in response identifies the sensitive information of the production environment. The computer modifies the sensitive information such that the production environment can utilize the sensitive information without error, and such that the sensitive information cannot be identified from the modified sensitive information. The computer generates the sandbox environment, based at least in part, on the identified components of the production environment and the modified sensitive information.
Receiving device, transmitting device, broadcasting system, receiving method, and non-transitory computer-readable recording medium
A receiving device includes: an output unit configured to output content broadcast from a transmitting device; an application execution unit configured to execute an application; a security policy acquiring unit configured to acquire security policy level data sent from the transmitting device with respect to the application, the security policy level data indicating a sorted level of the application; a policy level acquiring unit configured to acquire policy level data sent from the transmitting device with respect to currently broadcast content, the policy level data indicating a sorted level of the currently broadcast content; a determining unit configured to determine whether or not the application is an application to be controlled, based on the policy level data acquired by the policy level acquiring unit and the security policy data of the application acquired by the security policy acquiring unit; and an application control unit configured to instruct the application execution unit to control the application determined to be the application to be controlled.
Communications security systems
A method of establishing secure communications between a first computer, eg a client computer, and a second computer, eg a web server, whereby the client computer receives one or more security policies relating to the web server. A client application examines the client computer and preferably configures one or more aspects of the client computer in order to make it comply with the security policies. Once the web server receives the results of this examination and/or configuration process, it can determine whether the secure communications are to be established and whether any restrictions need to be placed on this communication and/or the activity conducted via the communication.
Systems and methods for applying data-loss-prevention policies
A computer-implemented method for applying data-loss-prevention policies. The method may include (1) maintaining a list of applications whose access to sensitive data is controlled by data-loss-prevention (DLP) policies, (2) detecting an attempt by a process to access sensitive data, (3) determining that the process has a parent-child relationship with an application within the list of applications, and (4) applying, based at least in part on the determination that the process has the parent-child relationship with the application, a DLP policy associated with the application to the process in order to prevent loss of sensitive data. Various other methods, systems, and computer-readable media are also disclosed.
Method and system for converting content into multiple formats
A communication system 10 includes a content processing system 12 and a distribution system 14. The content processing system 12 receives content and stores the content in a first file format in the content repository 40. A workflow system 54 determines a target for the content and routes the content to a content converter 64 corresponding to the target. The content converter 60 converts the content and forms a second file in a second format different than the first format. The content repository 40 stores the second file therein.
System and method of verifying a video blackout event
A method of verifying a blackout event is disclosed that includes receiving blackout event data from an event log database of a video distribution platform at a subscriber event transmission interface (SETI) communicating with an electronic data warehouse (EDW) system. The method also includes creating at least one EDW load-ready file that includes at least a portion of the blackout event data.
Content sequence technology
Content sequence technology, in which a channel subscribed to by a user of a content delivery network is identified and a genre of the identified channel is determined. A play sequence policy is selected for the identified channel based on the determined genre. The play sequence policy defines one or more rules used in determining an order to play content files on the identified channel. Display of the identified channel is controlled based on the selected play sequence policy.
Method and apparatus for high bandwidth data transmission in content-based networks
Methods and apparatus for delivering data over extant infrastructure within a content-based network. In one embodiment, the network comprises a cable network, and the infrastructure comprises that nominally used for on-demand (OD) services such as VOD. The method includes the allocation of dedicated end-to-end network resources via a “session request, as well as data flow control and packet size adaptation, by a data server based on feedback from the requesting/receiving client device (e.g., DSTB) within the network. Mechanisms for retransmission requests for error recovery are also provided.
Media engagement factors
The generation of engagement factors sufficient to represent user engagement, attention, recognition, interest and/or responsiveness to media being shown or otherwise access through an output device is contemplated. The engagement factors may be values or other representations sufficient to facilitate categorizing viewer activities during playback of particular portions of the media.
Method of processing non-real time service and broadcast receiver
A method of processing a non-real time service of a broadcast receiver, which receives and processes a service being transmitted in non-real time, and a broadcast receiver are disclosed. Herein, the method of processing a non-real time service of a broadcast receiver includes receiving a signaling information table including additional information on contents configuring a non-real time service and a content identifier for each content, acquiring and storing the additional information on contents and the content identifier for each content from the signaling information table, when a non-real time specific service guide is requested from a real-time specific service guide screen, configuring the non-real time specific service guide based upon the stored additional information and content identifier of the stored contents, thereby displaying a non-real time specific service guide screen, and performing a playback or download scheduling function on the content selected from the non-real time specific service guide screen.
Playback device, television reception device using the same, playback method, and computer program
A playback device for playing back a program, including a program information acquisition unit configured to acquire program identification information for identifying a program; and a memory unit configured to store an adjustment item setting file for setting an adjustment item related to playback of a program for each program identification information.
User-based program guide methods and systems
An exemplary method includes a media content delivery system 1) providing a program guide view of a program guide for display within a viewing area of a display screen, the program guide comprising a navigable user axis representative of a plurality of users selected by a main user as being of interest to the main user and a time axis representative of a plurality of time slots, and 2) presenting, within the program guide view, information identifying one or more media content instances designated for access during one or more time slots included in the plurality of time slots by one or more users included in the plurality of users. Corresponding methods and systems are also disclosed.
Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same
A virtual channel table for broadcasting protocol and a method for broadcasting by using the virtual channel table includes identification information identifying and permitting discrimination of active and inactive channels contained in the virtual channel table. At a receiver, the virtual channel table transmitted from the transmitting side is parsed, thereby determining whether the current received channel is an active or inactive channel.
Method and system for synchronization of messages to content utilizing automatic content recognition
An automatic content recognition (ACR) enabled (ACR-enabled) connected TV device may be operable to present, utilizing ACR, an overlay starting at a time that is synchronized to an identified event in presented content. The overlay may comprise one or more messages associated with an online social network. The presented content may comprise a program, a movie, a game or a commercial. The one or more messages may be pre-generated, before presentation of the content, for presentation synchronized to the identified event during the presentation of the content. The one or more messages may be generate during broadcast or streaming of a program or a movie, and the presented content, which comprises the program or the movie, may be presented during a time-delayed playback. The ACR-enabled connected TV device may track, utilizing the ACR, how each of the presented one or more messages is actually being viewed and/or interacted with.
Method of recommending media content and media playing system thereof
A method of recommending media content for a media playing system includes identifying a user in a viewing area; determining whether personal information of the user is stored in a database; and generating information related to a first media content recommendation according to the personal information when the personal information of the user is stored in the database.
Efficient management of kernel driver performance data
An improved technique for managing access to performance data of a kernel driver includes acquiring performance data in the kernel driver over identified intervals of time marked by the kernel driver itself and transferring the performance data to a persistence manager outside the kernel, where client applications can access the performance data and/or post-processed versions thereof without disturbing the operation of the kernel driver.
Method and system for implementing function extension of open platform
Described are a method and a system for implementing function extension of an open platform. In the system, services that can be provided by an open platform are encapsulated and an operation interface is provided, so that plug-ins uniformly inherit the operation interface and transmit control parameters through the interface into a service entry to obtain the services. Therefore, the open platform has a simple framework and low coupling degree. Since the plug-ins are uniformly managed by a plug-in manager, the manageability and dynamic extensibility of the open platform are enhanced.
Computer data communications in a high speed, low latency data communications environment
A method includes issuing a request, from an application of a contributing client device to a stream administration server, to contribute messages from the application to a feed adapter within a data communication environment via a message stream which bypasses the stream administration server. The feed adapter is coupled to a feed source via a feed adapter input stream and to at least one subscribing device via a feed adapter output stream. The feed source is separate from the contributing client device. The feed adapter input stream is separate from the message stream. The method includes receiving, in response to the request and an authentication of the contributing client device. A set of constraints on messages is to be transmitted from the contributing client device to the feed adapter.
Snapshot view of multi-dimensional virtual environment
A computer-implemented method of enabling communication between a first client and a second client mutually participating in a communication session, in which the second client, but not the first client, has an application for rendering multi-dimensional virtual environments, is claimed. The method includes transmitting to the second client information representing a plurality of objects in a multi-dimensional virtual environment, wherein the multi-dimensional virtual environment is rendered at the second client, and transmitting to the first client an image for display by a first client application in a web page, the image including a representation of the multi-dimensional virtual environment rendered at the second client. The second client has an application, distinct from the first client application, for rendering multi-dimensional virtual environments.
Microprocessor architecture having extendible logic
A microprocessor architecture having extendible logic. One or more customized applications are available to the instruction pipeline. The customizable applications may include software, extension logic instruction or register, dynamically configurable hardware logic, or combinations of these. In order to enable the operating system to interface with the customized extension applications, at least one software extension is provided to the operating system. When a specific extension is requested a software exception is generated by the OS. In response to the exception, the least one software extension is called to handle context switch and dynamic configuration of the extendible logic of the microprocessor.
Resolving RCU-scheduler deadlocks
A technique for resolving deadlocks between an RCU subsystem and an operating system scheduler. An RCU reader manipulates a counter when entering and exiting an RCU read-side critical section. At the entry, the counter is incremented. At the exit, the counter is manipulated differently depending on the counter value. A first counter manipulation path is taken when the counter indicates a task-context RCU reader is exiting an outermost RCU read-side critical section. This path includes condition-based processing that may result in invocation of the operating system scheduler. The first path further includes a deadlock protection operation that manipulates the counter to prevent an intervening RCU reader from taking the same path. The second manipulation path is taken when the counter value indicates a task-context RCU reader is exiting a non-outermost RCU read-side critical section, or an RCU reader is nested within the first path. This path bypasses the condition-based processing.
Network balancing procedure that includes redistributing flows on arcs incident on a batch of vertices
A representation of a flow network having vertices connected by arcs is provided. The vertices include a first set of vertices that provide flow to a second set of vertices over arcs connecting the first set and second set of vertices. A balancing procedure in the network is performed that includes redistributing flows on arcs incident on the second set of vertices. The balancing procedure includes selecting a batch of the vertices in the second set, and redistributing flows on arcs incident on the selected batch of vertices. The selecting and redistributing are repeated for other batches of vertices in the second set.
Predicting resource requirements for a computer application
A resource consumption model is created for a software application, making it possible to predict the resource requirements of the application in different states. The model has a structure corresponding to that of the application itself, and is interpreted to some degree in parallel with the application, but each part of the model is interpreted in less time than it takes to complete the corresponding part of the application, so that resource requirement predictions are available in advance. The model may be interpreted in a look-ahead mode, wherein different possible branches of the model are interpreted so as to obtain resource requirement predictions for the application after completion of the present step. The model may be derived automatically from the application at design or compilation, and populated by measuring the requirements of the application in response to test scenarios in a controlled environment.
Method and apparatus having resistance to forced termination attack on monitoring program for monitoring a predetermined resource
Exemplary embodiments include a method and system having resistance to a forced termination attack on a monitoring program for monitoring a predetermined resource. Aspects of the exemplary embodiment include a device that executes a predetermined process including a monitoring program that monitors a predetermined resource, wherein the predetermined process is a process for which the predetermined resource becomes unavailable in response to termination of the predetermined process; a program starting unit for starting the monitoring program in response to an execution of the predetermined process; and a terminator for terminating the predetermined process in the case where the monitoring program is forcibly terminated from the outside.
Storage management computer and method for avoiding conflict by adjusting the task starting time and switching the order of task execution
A storage apparatus includes a storage unit for storing data read/written by a host computer and provides the host computer with a storage area of the storage unit as one or more volumes. The storage management computer includes a first memory for storing task information including contents of an operation process performed on the storage apparatus, as well as a scheduled starting time and scheduled termination time of a process, and, in the case where first task information is stored in the first memory, when resources used in the process of second task information stored in the first memory are the same as resources used in the process of the first task information, the storage management computer computes times required for executing the first task information and the second task information, based on a time during which the processes of the first and second task information conflict with each other.
Common contiguous memory region optimized long distance virtual machine migration
Embodiments relate to migrating a virtual machine (VM) between work groups. A first machine in a first work group generates a migration request that identifies one or more contiguous memory regions used by the VM for operation. The first machine transmits the migration request to a plurality of work groups. The first machine receives a score from each of the plurality of work groups indicating a number of contiguous memory regions identified in the migration request that are available at the respective work group. A second work group in the plurality of work groups is identified as a destination for the VM based on the scores and a distance of the second work group from the first machine. A migration of the VM from the first machine to a second machine in the second work group is caused based on the identification of the second work group as the destination.
Environment-driven application deployment in a virtual infrastructure
A system for recipe and blueprint-driven automated application deployment comprises a processor and a memory. The processor is configured to receive an environment, receive an application configuration, and deploy an application using the environment and the application configuration. The environment is provisioned using an environment template, and wherein the environment template is built using a blueprint. The application configuration comprises one or more application endpoints. The memory is coupled to the processor and is configured to provide the processor with instructions.
Operating methods for virtual machine server and nodes based on round trip time (RTT) information and apparatuses thereof
Disclosed are operating methods of a server and a node, and apparatuses thereof, and more particularly, to operating methods of a virtual machine server and a virtual machine node, and apparatuses thereof. The operating method of the virtual machine server according to the exemplary embodiment of the present invention includes: generating index information of blocks for booting a virtual machine in a virtual machine image; generating list information of neighboring nodes for a target node; and transferring the index information and the list information to the target node.
Intelligent and automated code deployment
Exemplary method embodiments for deploying code in a computing sysplex environment are provided. In one embodiment, by way of example only, a system-wide trending mechanism is applied. At least one of an idle time and a low Central Processing Unit (CPU) utilization time of one system in the sysplex environment is matched with an estimated deployment time obtained from at least one of a latest measured period of time and a calculated time trend. A system-wide coordinating mechanism is applied. A staggered code deployment operation is recommended for at least one node of the system at an optimum system time generated from the matching. Data obtained from the code deployment operation is recorded, including a new latest measured period of time. The data is used to generate an updated time trend.
Methods, systems and computer products for a dynamic repository
A software development service offering of generating and installing software applications packages on computer systems running a set of operating systems including LINUX and UNIX operating systems, by creating a dynamic repository; populating a plurality software packages; running a tool that creates a set of index files, wherein the set of index files includes a menu of the plurality of software packages, wherein each software package in the plurality of software packages contains a set of contents; determining whether a software package is included in a menu of the plurality of software packages; and delivering to a client system the software package requested in a selection request, or delivering to the client system an other software package, when the software package is not included in the menu of the plurality of software packages.
Stochastic method for program security using deferred linking
A method to install software by receiving a partially linked version of the software including a plurality of code modules, randomly ordering the code modules, assigning non-volatile memory addresses for the software and generating an executable image of the software. A system to install a software application having a partially linked object code version of the software application including a plurality of code modules and an installation program configured to randomly order the code modules, assign non-volatile memory addresses for the software, and generate an executable image of the software, wherein the installation program performs the ordering, assigning, and generating on a target computing device that is different from a development computing device that partially linked the software application.
Apparatus and method for providing application service based on area
The present invention relates to a short range wireless communication device for providing an application service based on an area. In particular, an apparatus for providing an application service based on an area in a small cell including a femtocell base station or a WiFi Access Point, the apparatus including a communication unit to receive a list of application services from an Application Service Provisioning Server, select and download at least one application service from the received list, an application service database to store the at least one downloaded application service, a service controller to install the at least one downloaded application service, or uninstall an installed application service, a user equipment access detector to detect a user equipment entering or exiting a service area, and a user equipment database to store an identifier and information of the user equipment entering or exiting the service area.
Automatic self-test method for medical devices
A computer-implemented method is disclosed for validating an operating system patch, along with a computer program product and a patch module. After output of an operating system patch an automatic self-test is executed on the medical device at application level, which tests whether the installed operating system patch was able to be successfully installed. In this case a validation signal is output. The self-test is executed directly on the application system.
Methods and apparatuses for automatic type checking via poisoned pointers
A method and an apparatus that modify pointer values pointing to typed data with type information are described. The type information can be automatically checked against the typed data leveraging hardware based safety check mechanisms when performing memory access operations to the typed data via the modified pointer values. As a result, hardware built in logic can be used for a broad class of programming language safety check when executing software codes using modified pointers that are subject to the safety check without executing compare and branch instructions in the software codes.
Methods and systems for generating test information from a source code
Systems and methods for generating test information from a source code are described. One of the methods includes accessing the source code. The method further includes receiving a modification of the source code to generate a modified source code. The modification includes one or more instructions that do not affect functions performed by executing the source code. The modification further includes one or more instructions for generating test information regarding each executable line of the source code.
Efficient resumption of co-routines on a linear stack
Unsuspended co-routines are handled by the machine call stack mechanism in which the stack grows and shrinks as recursive calls are made and returned from. When a co-routine is suspended, however, additional call stack processing is performed. A suspension message is issued, and the entire resume-able part of the call stack is removed, and is copied to the heap. A frame that returns control to a driver method (a resumer) is copied to the call stack so that resumption of the co-routine does not recursively reactivate the whole call stack. Instead the resumer reactivates only the topmost or most current frame called the leaf frame. When a co-routine is suspended, it does not return to its caller, but instead returns to the resumer that has reactivated it.
Software breakpoints with tailoring for multiple processor shared memory or multiple thread systems
The present invention provides methods for executing instructions in a processor to facilitate the debugging of digital systems. In these methods, a halt identifier field is associated with every instruction that holds an encoding specifying an action to be performed by a processor. As instructions are executed on a processor, actions are performed by the processor based on the value of the halt identifier field of the executed instructions. In an embodiment, when each instruction is executed, the contents of the halt identifier field are compared to a pre-selected identifier value and the processor is halted if the values are the same. In a multiprocessor system, the pre-selected identifier may be a unique value that identifies the processor such that when the halt identifier field is equal to that value, the processor will halt. In a single processor system, the pre-selected value may be used to identify a task, a process, or a thread of execution that is to be halted when a halt identifier field with that value is encountered.
Specific debug trace collecting
A computing system for converting software code into an executable program include an expanding preprocessor that receives software code including debug statements and expands the debug statements into conditions that include a static variable and that must be met before a trace contained in the statement is executed, the expanding preprocessor creating an expanded code output. The system also includes a replacement preprocessor coupled to the expanding preprocessor and receiving the expanded code, the replacement preprocessor forming replaced code by replacing one or more occurrences of the static variables with a unique variable name and a compiler that compiles the replacement code to create an executable.
Detecting plagiarism in computer source code
Plagiarism is detected by comparing statements within source code of a first program to comments within source code of a second program.
Systems and methods for processing software application metadata associated with a software application
Systems and methods for processing software application metadata associated with a software application are provided. A representative method includes the step of collecting software application metadata associated with a software application. The software application metadata includes a first set of information related at least one of the following: screens, paths, and layers associated with the software application. The method further includes the step of storing the software application metadata in a data repository.
Configuring attributes using configuration subgraphs
In an embodiment, a specification of a configuration subgraph is received. The configuration subgraph may graphically specify an attribute for an element in a block diagram model. A relationship may be established between the configuration subgraph and the element. The configuration subgraph may be evaluated to produce a result. The result may be used to configure the attribute of the element during or prior to a compilation of a dynamic portion of the block diagram model. The configuration subgraph may not be used during an execution of the dynamic portion of the block diagram model.
User customizable queries to populate model diagrams
A method, computer program product, and system for visually modeling architectures or system designs are described. A method may comprise providing an architectural model having a plurality of elements of one or more types. The method may further comprise providing a platform for a user to develop a non-software code query relating to the elements of the model. The method may also comprise executing the developed query to extract one or more of the plurality of elements from the model. The method may additionally comprise populating a diagram with the extracted one or more of the plurality of elements.
Activity points based effort estimation for package implementation
Techniques and solutions are provided for determining overall effort for a package implementation program. Determining overall effort can comprise determining a program parameter complexity value for each of a plurality of program parameters, determining activities for program phases and program work streams, calculating an activity point value for each determined activity, and calculating overall effort for the package implementation program. The activity point values can be calculated using, at least in part, the program parameter complexity values. Calculating the overall effort can use, at least in part, the activity point values and a pre-determined productivity metric that is specific to a type of the package implementation program.
Semiconductor integrated circuit design supporting apparatus, method, and program
A latency adjusting part calculates a necessary delay based on the number of FFs that are required to be inserted between respective modules through high level synthesis of a behavioral description. An input FF stage number acquiring part extracts a pin having an input that receives an FF, and acquires the number of stages of input FFs of FF reception. A latency re-adjusting part obtains an optimum delay based on the above-mentioned necessary delay and input delay. A former-stage module analyzing part detects, based on the above-mentioned synthetic log or HDL, a state having a minimum total number of FFs. An FF insertion optimizing synthesis part subjects an entire circuit to high level synthesis again based on the above-mentioned optimum delay and an FF inserting position obtained based on the state having the minimum number of FFs, to thereby obtain optimized HDL.
System and method for reducing power consumption of integrated circuit
A method and system for reducing power consumption of an integrated circuit with an EDA tool by analyzing and modifying a layout design having a plurality of nets across multiple metal layers. The method includes identifying long nets in the layout design, determining an interconnect capacitance of each of the long nets, determining a net level switching activity of each of the long nets, generating a high power impact list using the interconnect capacitance and the switching activity of each of the long nets, modifying a metal spacing of the long nets listed in the high power impact list.
Methods, systems, and articles of manufacture for implementing a physical electronic design with area-bounded tracks
Disclosed are methods, systems, and articles of manufacture for implementing a physical electronic design with area-bounded tracks. One aspect identifies an area in an electronic design and a track pattern associated with the area, identifies active tracks in the track pattern, and creates spacetiles with the active tracks. This aspect uses area-based search probes based on spacetiles to find viable implementation solutions to implement the area in the electronic design. Another aspect identifies a tracked area associated with a track pattern and a trackless area and use spacetile(s) and a via spacetile layer to transition between the tracked area and the trackless area for implementation of the electronic design in the tracked or the trackless area of the electronic design.
System and method for designing cell rows
A system and method for designing integrated circuits is disclosed. An embodiment comprises placing a standard cell with a first cell height into a cell row with a different height. The standard cell may have a height smaller than the cell row or else may have a height that is larger than the cell row. Vertical fillers and horizontal fillers are utilized to extend and connect the standard cell to adjacent cells without having to redesign the entire cell row.
Stability improvements for timing-driven place and route
Techniques for reducing post-routing delay variance are described herein. In an example embodiment, an initial netlist includes multiple instances that represent digital components of an electronic design. An base signature is assigned to each instance in the initial netlist, where the base signature is based on two or more design or connectivity attributes of the instance. The base signatures are then used to generate an initial instance ordering of the instances in the initial netlist. A subsequent netlist, different from the initial netlist but representing the same electronic design, is received. Base signatures are assigned to the instances on the subsequent netlist and a subsequent instance ordering is generated. The subsequent instance ordering preserves the same order as the initial instance ordering for those instances that are included in both the initial netlist and the subsequent netlist. In this manner, any later netlist-based processing (e.g., such as packing, placement, and routing) is shielded from the negative re-design effects caused by the subsequent changes to the initial netlist and, consequently, the post-routing timing delay variance of the electronic design is reduced.
Synthesis of clock gated circuit
Technology for synthesizing a behavioral description of a circuit into a structural description of the circuit is disclosed. The behavioral description may describe the circuit in terms of the circuit's behavior, or other functionality, via multiple statements, including a conditional statement. The technology includes analyzing statements upstream and/or downstream from the conditional statement, identifying one or more statements having dependency relationships with the conditional statement and inferring one or more potential clock domains for logic associated with the identified statements.
Mask assignment optimization
A method for optimizing mask assignment for multiple pattern processes includes, through a computing system, defining which of a number of vias to be formed between two metal layers are critical based on metal lines interacting with the vias, determining overlay control errors for an alignment tree that defines mask alignment for formation of the two metal layers and the vias, and setting both the alignment tree and mask assignment for the vias so as to maximize the placement of critical vias on masks that have less overlay control error to the masks forming the relevant metal lines.
Sequential selection of multiple objects
A device may be configured to provide a user interface that supports sequential selection of objects displayed on a screen. As configured, the device may display a presentation of multiple objects, and the device may receive a user input that defines a path within the presentation of displayed objects. The device may then determine the sequential order of a selected subset of the displayed objects. Based on this sequential order, the device may select, initiate, and perform an action that is targeted at the selected subset of the objects. In the context of an action game, the user may trace the path through various enemies, and the device may select and perform the action based on the number of enemies, the type of enemies, or the order in which the enemies were selected. Selection and initiation of the action may begin while the user input is still being received.
A system and a method are disclosed for effectively displaying database records on a device having a display area that is small compared to the underlying data being represented. A simulated catalogue is displayed with cards associated with database records. Detailed information is presented for a record on a card obscuring information related to other records. A user is allowed to swipe on the catalogue causing simulated movement of the cards thereby displaying information associated with a database record previously obscured. The catalogue is moved with an initial velocity determined by the speed of swiping and decelerated based on a drag factor until it comes to a stop and displays information for the record reached. The ability to determine the final record displayed when the catalogue stops allows pre-fetching of the data associated with the record.
Graphical user interface dynamic menu slot
A computer based method is provided. The computer based method comprises a first electronic device launching an application and, in response to launching the application, the first electronic device receiving a first message from a second electronic device. The first message comprises a first link. The computer based method further comprises the first electronic device configuring a graphical user interface of the application to couple a dynamic selector of the graphical user interface to the first link and presenting a first screen of the graphical user interface, the first screen comprising the dynamic selector and a plurality of static selectors, wherein selecting the dynamic selector activates the first link.
User interface for selecting a photo tag
There is disclosed a user interface for selecting a photo tag. In an embodiment, the user interface embodies a method of selecting a photo tag for a tagged photo, comprising: providing a tag entry field for entering a photo tag; in dependence upon a string entered by a user, displaying in a matching tag list any tags from one or more selected tag sources matching the entered string. The method may further comprise displaying a tag type for each tag appearing in the matching tag list. The method may further comprise allowing user selection of a tag in the matching tag list to complete the tag entry field.
Image display apparatus
A simplified menu includes menu items of a “user menu” in which a user can change and customize a menu, a “user menu selection” for selecting a menu item capable of being set in the user menu, and a “detailed menu switch” for switching the menu from a simplified menu to a detailed menu. The “user menu selection” is displayed in the simplified menu, which is not a menu of a different hierarchy. Accordingly, the user can perform an operation in the simplified menu.
Method and system of providing enhanced appointment notification service to mobile devices
A mobile device includes a client application configured to process and display a push notification specifying an appointment reminder originating from a server acting as an appointment manager. The client displays a menu of available options for conducting additional appointment-related transactions, such as confirmation, rescheduling, or cancellation of the appointment. Based on the user selection, the client conducts a user-interactive transaction with the server to complete the requested appointment service.
Stackable workspaces on an electronic device
Systems and methods for providing stackable workspaces on an electronic device are provided. A system includes a navigation module configured to display a first workspace of workspaces stacked along a stacking axis, and to display a navigation menu when the first workspace is displayed. The navigation menu comprises access points, each of which is associated with an application. The system includes a workspace module configured to open at least one of the applications in a second workspace stacked on the first workspace. The system includes a detection module configured to detect a second workspace scrolling command. The navigation module is configured to display the second workspace in response to the second workspace scrolling command. Displaying the second workspace comprises traversing the stack from the first workspace to the second workspace along the stacking axis. The navigation module is configured to display the navigation menu when the second workspace is displayed.
Method for management and broadcasting an event context
A method is provided for automatically displaying context information to an information fragment with no user interaction. The method includes: displaying the fragment in a first window, wherein the window and fragment each relate to a source process; pointing with a cursor to a part of the fragment displayed in the first window; generating an event object comprising coordinates of the cursor and part of the information fragment; broadcasting the event object to the source process, wherein the only information exchange between the target process and the source process is based on the event object; interpreting the event object by the target process and generating a response by the target process; and displaying the response of the target process in a second window, wherein the second window is related to the coordinates of the cursor.
Image forming apparatus with touchscreen and method of editing input letter thereof
Provided are an image forming apparatus with a touchscreen and a method of editing input letters using the same. In the method, an inputted text is displayed on the touchscreen using keys of the soft keyboard. A letter to be edited is received from the displayed text. At least one of coordinates representing adjacent keys of the soft keyboard is determined based on a coordinate corresponding to a location of the received letter on the touchscreen. At least one of the magnified images of the adjacent keys corresponding to the determined coordinates and functions keys is displayed. The displayed text is edited using a letter corresponding to one key that is selected from the magnified image of the adjacent keys.
Method and apparatus for dynamic multiresolution clinical data display
A multi-level information display system graphically represents clinical information for a user. The system includes a user interface providing clinical content to a user and accepting user input with respect to clinical content. The system also includes a graphical summary representation of a patient-related clinical data value. The graphical summary representation has one or more visible characteristics indicating an importance of the patient-related clinical data value. The system also includes a thumbnail trend view providing a graph of data elements used to provide the patient-related clinical data value shown in the graphical summary representation. The system further includes an originating data view retrieving and displaying, via the user interface, a source document corresponding to at least one data element on the graph shown in the thumbnail trend view. The various views are displayed via the user interface based on user manipulation of a cursor with respect to the displayed views.
System and method for streamlining user interaction with electronic content
Various aspects and embodiments are directed to a graphical user interface that organizes interface elements into views of computer content for presentation to a user. Different views of are used to provide an interface that is responsive to configurations of the device and responsive to activity being performed by the user. Aspects include permitting the user to transition the device from one configuration to another during its use, for example from easel to laptop modes. Further the elements that comprise the graphical user interface are configured to present a summarized view of available actions and content, in order to simplify user interaction. The different views present different organizations of the interface elements and in some example display only certain ones of the modes of content in order to reduce the number of options a user must navigate to accomplish an objective. According to another aspect, methods and systems for streamlining user interaction with computer content are provided. In some embodiments, streamlining includes pre-configuring a user device based on received information. Other embodiments include presenting consistent visual representations used to navigated to views that present computer content.
System, method, and computer program product for detecting unwanted data based on an analysis of an icon
A system, method, and computer program product are provided for detecting unwanted data based on an analysis of an icon. In use, an icon is analyzed. Furthermore, unwanted data is detected based on the analysis.
Method and apparatus for updating a web-based user interface
A method and apparatus for updating a web-based user interface. The method comprises generating a user interface for a host application, accessing the user interface in a web browser, and modifying the user interface within the web browser during run-time of the application.The apparatus comprises a user interface, a user interface updater, a web browser, and a host application. The web browser provides a way to display, access, and modify the user interface for communicating with the host application. The user interface updater generates the user interface and modifies the user interface in response to command information received from the web browser.
Modifying running of plug-in on hidden tab of browser
Various example embodiments are disclosed. According to an example embodiment, a non-transitory computer-readable medium may include computer-executable instructions stored thereon. When executed by at least one processor, the instructions may be configured to cause a computing system to receive, by a web browser, a file from a web server, the file including an instruction to launch a plug-in of the browser, launch the plug-in in an active state based on the instruction, provide a message to the plug-in indicating that the plug-in is hidden and is not displayed as visible by the web browser, and modify running of the plug-in from the active state based on the message.
Live search chat room
One embodiment provides a system of exchanging information between at least two parties over a network. The system includes a chat room generator module, executed by one or more processors, to receive a comparison result between an existing first key word search from a first party and a subsequent second key word search from a second party via a network, and to generate a new chat room embedded into a search result web page associated with the second party, when the comparison result indicates no substantial similarity between the first key word search and the second key word search.
Image management method and system using thumbnail in DLNA system
An image management method and system are disclosed which can increase user convenience by reducing a display time of thumbnails in a DLNA system. The DLNA system includes a digital media server for generating a thumbnail group image using thumbnails corresponding to at least one original image file and transmitting the thumbnail group image, and a digital media player for receiving the thumbnail group image from the digital media server and requesting the digital media server to transmit an original image file corresponding to a selected thumbnail among thumbnails included the thumbnail group image.
Image-derived user interface enhancements
A device configured to select a portion of an image, the selecting being based at least on parameters associated with a user interface element of the device, is disclosed herein. The device is further configured to apply the selected portion of the image to the user interface element.
Method and system for managing volumes within a compilation of content
A web-based system, method and program product are provided for adding content to a content object stored (e.g., a custom compilation or prepublished work) in a data repository as a group of hierarchically related content entities. Each noncontainer content object is preferably stored as a separate entity in the data repository. Each content entity is also stored as a row in a digital library index class as a collection of attributes and references to related content entities and containers. As the user selects desired objects for inclusion in a content object, the system arranges the objects hierarchically, e.g., into volumes, chapters and sections according to the order specified by the user. The system then creates a file object (e.g., a CBO) defining the content object that contains a list or outline of the container and noncontainer entities selected, their identifiers, order and structure. This file object is stored separately in the data repository. An aspect of the invention is the calculation of the compilation's cost by estimating the amount of content it contains and determining a content cost based upon the content estimate. Optionally, a cost is assigned to each content entity in the data repository and these actual costs are summed as part of the cost estimation procedure.
Efficient event delegation in browser scripts
Event handlers associated with markup language documents represented in a web browser are identified efficiently in response to an event. The markup language document is represented as a hierarchical structure comprising nodes and edges. Nodes are associated with node types, each node type defining how descendants of the node respond to events. The markup language document provides mappings of sets of node types to sets of handlers. In response to an event associated with a node, the types of nodes encountered in a path connecting the node with the root node are identified. Handler sets of the node types encountered in the path connecting a node with the root node are used to determine the handlers to be executed in response to the event. Data is associated with nodes to allow handler code to distinguish between nodes of the same node type.
Document assembly system
A document assembly or document automation system includes an assembler for generating an instance document on the basis of a source document and one or more logic source documents referenced by the source document. The source document and logic source documents are XML documents including at least one XML processing instruction. The source document and logic source documents are valid with respect to XML schema. The system generates an instance document in HTML, PDF or RTF format by resolving variables in the source document and/or logic sources using one or more data sources. This may involve performing one or more interview rounds with a user of the system, access to a database, and/or evaluation of a function defined in one of the documents. The system includes an editor for creating and maintaining source documents and logic source documents while maintaining their validity with respect to the appropriate XML schema.
Document clipping with linked information
An apparatus receives a first selection command to select a part of an area of a displayed first document (e.g., text, image, etc) as a selected area. When the apparatus receives the first selection command, the apparatus causes display content included in the selected area selected in response to the first selection command to be stored in a storage unit and determines whether link information linked to second document is included in the selected area. The apparatus acquires document data of the second document using the link information in response to determining that the link information is included in the selected area.
Method and system of a user associating a first webpage link and second webpage link and viewing of the contents of the webpage links by the selection of the first webpage link
A link association method and system. The method includes receiving by a computer processor from a user, a first link for a first Webpage and a second link for a second Webpage. The user determines that the first Webpage is related to the second Webpage. The computer processor receives a specification command indicating that the first Webpage is related to the second Webpage and in response the computer processor associates the first link with the second link. The computer processor stores the first link associated with the second link and generates a report indicating that the first link is related to the second link.
Memory controller and semiconductor storage device
According to one embodiment, a decoder of a memory controller includes: a syndrome calculating unit configured to calculate a syndrome based upon a code word read from the memory; an error locator polynomial generating unit configured to generate an error locator polynomial based upon the syndrome, and to obtain a number of errors based upon the generated error locator polynomial; and an error location calculating unit configured to calculate an error location based upon the error locator polynomial, wherein the process of the error location calculating unit is not executed, when the number of errors is not less than the maximum number of bits that can be corrected by the error locator polynomial generating unit.
Generation and application of a sub-codebook of an error control coding codebook
There is provided a method of encoding and decoding data using an error control code having a codebook G. The codebook G is a sub-codebook of a codebook P. Each codeword g in the sub-codebook G has an autocorrelation amplitude that is different from and higher than each correlation amplitude between g and each of the other codewords in the sub-codebook G. In one specific embodiment in which the codebook P is that of a Reed-Muller code, using G instead of P reduces the likelihood of the presence of more than one maximum correlation amplitude when computing the non-coherent decision metric during decoding.
Power consumption in LDPC decoder for low-power applications
This disclosure relates generally to low power data decoding, and more particularly to low power iterative decoders for data encoded with a low-density parity check (LDPC) encoder. Systems and methods are disclosed in which a low-power syndrome check may be performed in the first iteration or part of the first iteration during the process of decoding a LDPC code in an LDPC decoder. Systems and methods are also disclosed in which a control over the precision of messages sent or received and/or a change in the scaling of these messages may be implemented in the LDPC decoder. The low-power techniques described herein may reduce power consumption without a substantial decrease in performance of the applications that make use of LDPC codes or the devices that make use of low-power LDPC decoders.
A memory system includes a first nonvolatile memory, a second nonvolatile memory with a longer access latency than the first nonvolatile memory, a first error correction unit, a second error correction unit, and an interface. The first nonvolatile memory stores first data and a first error correction code generated for the first data. The second nonvolatile memory stores a second error correction code which is generated for the first data with a higher correction ability than that of the first error correction code. The first error correction unit performs error correction on the first data by using the first error correction code. The second error correction unit performs error correction on the first data by using the second error correction code. The interface transmits the first data after the error correction to a host.
Interleaved parallel redundancy check calculation for memory devices
In one embodiment, a mechanism for interleaved parallel cyclic redundancy check calculation for memory devices is disclosed. In one embodiment, a method includes generating an index value as part of a cyclic redundancy check (CRC) operation, the index value being a result of a first exclusive-or operation applied to both of input data directly as-is from a data bus and to data in a 64-bit accumulator utilized to store results of the CRC operation. The method also includes indexing an interleaved parallel CRC table with the index value to retrieve a 64-bit polynomial entry from the CRC table, performing a second exclusive-or operation on the retrieved polynomial entry and data in the 64-bit accumulator, storing the results of the second exclusive-or operation in the 64-bit accumulator, and transmitting contents of the 64-bit accumulator directly as-is to the data bus.
Compressor inputs from scan register output and input through flip-flop
The disclosure describes a novel method and apparatus for providing expected data, mask data, and control signals to scan test architectures within a device using the falling edge of a test/scan clock. The signals are provided on device leads that are also used to provide signals to scan test architectures using the rising edge of the test/scan clock. According to the disclosure, device test leads serve to input different test signals on the rising and falling edge of the test/scan clock which reduces the number of interconnects between a tester and the device under test.
Fault-driven scan chain configuration for test-per-clock
Aspects of the invention relate to using fault-driven techniques to generate scan chain configurations for test-per-clock. A plurality of test cubes that detect a plurality of faults are first generated. Scan chains for loading specified bits of the test cubes are then assigned to a stimuli group. From the plurality of test cubes, a test cube that detects a large number of faults that do not propagate exclusively to scan chains in the stimuli group is selected. One or more scan chains that are not in the stimuli group and are needed for observing the large number of faults are assigned to a compacting group. The number of scan chains either in the compacting group or in both of the compacting group and the stimuli group may be limited to a predetermined number.
Error correction device
In an error correction device, a frame generation section receives pulse signals as temperature information of a power switching element transmitted from a PWM comparator. The frame generation section sets a first correction pulse signal, a second correction pulse signal and the temperature information sequentially into each frame. A pulse width of the first correction pulse signal corresponds to a pulse width when a time ratio thereof becomes 100%. A pulse width of the second correction pulse signal corresponds to a pulse width when a time ratio thereof becomes 50%. A microcomputer receives the temperature information through a photocoupler and corrects the received temperature information. The microcomputer calculates a temperature detection value of the power switching element on the basis of the corrected temperature information.
Dynamic built-in self-test system
A method of performing a dynamic built-in self-test (BIST). The method includes performing a first test of a circuit on a semiconductor chip. The first test includes a first switch factor. The circuit during the first test is monitored with one or more sensors. A first sensor value of one or more sensors monitoring the circuit is determined. It is also determined whether the first sensor value is within a range of a programmable constant. A second switch factor is determined in response to determining that the first sensor value outside the range of the programmable constant.
Method and system for providing coordinated checkpointing to a group of independent computer applications
A method and system of checkpointing single process application groups and multi-process application groups. In an exemplary embodiment, the method may include creating at least one full checkpoint for each application in an application group, and creating at least one incremental application checkpoint for each application in the application group. Further, each of the at least one incremental application checkpoint may be automatically merged against a corresponding full application checkpoint. Further, checkpointing may be synchronized across all applications in the application group. In the exemplary embodiment, each application may use both fork( ) and exec( ) in any combination.
Confirming store-to-load forwards
A processor includes a store queue that stores information representing store instructions. In response to retirement of a store instruction, the processor invalidates the corresponding entry in the store queue, thereby indicating that the entry is available to store a subsequent store instruction. The store address is not removed from the queue until the subsequent store instruction is stored. Accordingly, the store address is available for comparison to a dependent load address.
Managing unreliable memory in data storage systems
A data storage system configured to manage unreliable memory units is disclosed. In one embodiment, the data storage system maintains an unreliable memory unit list designating memory units in a non-volatile memory array as reliable or unreliable. The unreliable memory unit list facilitates management of unreliable memory at a granularity level finer than the granularity of a block of memory. The data storage system can add entries to the unreliable memory unit list as unreliable memory units are discovered. Further, the data storage system can continue to perform memory access operations directed to reliable memory units in blocks containing other memory units determined to be unreliable. As a result, the operational life of the data storage system is extended.
Configuration fault localization in shared resource environments
Methods and arrangements for fault localization. Structural clusters for an environment are received, and configuration parameters and dependencies for components in the structural clusters are identified. A configuration map is built, and a configuration fault occurrence is ascertained.
Switch for clock synchronization over a switched fabric
Devices and methods for synchronizing devices over a switched fabric. A switch receives a request packet from a device, transmits a completion packet to the device, determines an in-switch delay, and stores the in-switch delay. Another switch receives a packet from a first device, forwards the packet to a second device, determines an in-switch delay of the packet, and stores the in-switch delay. Storing of in-switch delays may include adding an in-switch delay to values in one or more transaction delay fields of a packet. Storing of in-switch delays may include storing the delays in a storage element of a switch. In-switch delay may be determined as a difference between a receiving time corresponding to reception of a packet and a forwarding or transmittal time corresponding to forwarding or transmitting of a packet.
Method and apparatus for mobile terminal power management
A method and apparatus for mobile terminal power management is provided in this invention, which belongs to communication field. The method comprises: obtaining a reserving condition and power consumption per unit time of an application requiring power reservation, the reserving condition comprising a reserving time; according to the reserving condition and the power consumption per unit time, calculating an amount of power required to be reserved for the application; and reserving power for the application according to the amount of power required to be reserved for the application. The apparatus comprises: an obtaining module, a calculation module, and a power reservation module. Through calculating an amount of power required to be reserved during a reserving period of time for the application requiring power reservation, this invention can guarantee the use of an important application or application of priority as selected by a user.
Power-aware thread scheduling and dynamic use of processors
Techniques and apparatuses for providing power-aware thread scheduling and dynamic use of processors are disclosed. In some aspects, a multi-core system is monitored to determine core activity. The core activity may be compared to a power policy that balances a power savings plan with a performance plan. One or more of the cores may be parked in response to the comparison to reduce power consumption by the multi-core system. In additional aspects, the power-aware scheduling may be performed during a predetermined interval to dynamically park or unpark cores. Further aspects include adjusting the power state of unparked cores in response to the comparison of the core activity and power policy.
Optimal re-encryption strategy for joins in encrypted databases
Methods, systems, and computer-readable storage media for selecting columns for re-encryption in join operations. In some implementations, actions include determining a first column and a second column to be joined, receiving a first key corresponding to the first column and a second key corresponding to the second column, receiving a first rank associated with the first key and a second rank associated with the second key, selecting the second column for re-encryption based on the first rank and the second rank, and providing the first column, the second column, and the first key for performing a join operation, the second column being re-encrypted based on the first key.
Hardware protection for encrypted strings and protection of security parameters
In one embodiment, a disk drive is provided that is adapted for security authentication. The disk drive includes: a non-volatile memory storing object code; a processor for retrieving the stored object code; a decryption engine for decrypting a retrieved shared secret from the object code; and a first memory for storing the decrypted retrieved shared secret; wherein the processor is configured to overwrite the written decrypted retrieved shared secret after it has been used in an authentication procedure.
Modular cryptographic device providing multi-mode wireless LAN operation features and related methods
A cryptographic device may include a cryptographic module and a communications module removably coupled thereto. The cryptographic module may include a first housing, a user Local Area Network (LAN) interface carried by the first housing, and a cryptographic processor carried by the first housing and coupled to the user LAN interface. The communications module may include a second housing and a network wireless LAN interface carried by the second housing. The network wireless LAN interface may be coupled to the cryptographic processor, and it may be switchable between wireless LAN modes.
Recording medium device, terminal device, distribution device, control method, and program recording medium
When the terminal device attempts to use a special content, which has an attribute including information distinguishing the special content from regular contents and is stored in the recording medium device, the recording medium device refers to the revocation information indicating terminal devices restricted from using the special content. When the recording medium device determines the terminal device as a terminal device to be restricted from using the special content based on the terminal identifying information of the terminal device, the usage information output unit of the recording medium device does not transmit the necessary information for using the special content to the terminal device.
Method for supporting a reputation mechanism in a network and network
Method for supporting a reputation mechanism in a network including one or more domains with one or more users being connected to the domains, one or more Identity Providers that manage identity information, and at least one entity that functions as Web Service Consumer for the users. When a user requests a Web Service Consumer of one of the domains for a web service provided by a Web Service Provider, the requested Web Service Consumer requests its known Identity Providers regarding a recommendation of the Web Service Provider. The Identity Providers function as recommendation aggregators by collecting reputation assessments of the Web Service Provider from entities registered on the Identity Providers who return an aggregated recommendation to the requested Web Service Consumer that determines a trust assessment about the Web Service Provider. A privacy homomorphism is employed for providing an encrypted exchange of recommendation related information.
Computing device and method for protecting software of the computing device
In a method for protecting software of a computing device, a hypertext preprocessor (PHP) software program of the computing device is encrypted using an encryption rule to obtain an encrypted file. When the encrypted file needs to be decrypted, the method determines whether a predetermined hardware lock is connected to the computing device. When the predetermined hardware lock is not connected to the computing device, the method displays a prompt that indicates the predetermined hardware lock is not connected to the computing device. When the predetermined hardware lock is connected to the computing device, the method decrypts the encrypted file with a decryption rule corresponding to the encryption rule.
Virtual storage system and file encryption methods
A virtual storage system in data communication with a user computing device via a communication network and file encryption methods for encrypting electronic documents to be uploaded into a virtual storage system where the virtual storage system includes at least one processor which captures a data stream corresponding to an electronic document retrieved from an external system, to be uploaded to the virtual storage system, and creates at least one encryption parameter and encrypts the data stream captured using the at least one encryption parameter created. The virtual storage system further includes a plurality of redundant physical storage devices in data communication with the at least one processor and each configured to store the encrypted data stream corresponding to the electronic document.
Communication system and method for securely communicating a message between correspondents through an intermediary terminal
A wireless communication system includes a pager or similar device that communicates to a home terminal. The home terminal confirms the identity of the pager and attaches a certificate to the message for ongoing transmission. Where the recipient is also a pager, an associated home terminal verifies the transmission and forwards it in a trusted manner without the certificate to the recipient.
Data encryption and decryption
Systems and methods for data encryption and decryption are provided. Packets of a streaming video from a video source are received. A first packet of the streaming video is encrypted with a encryption key and transmitted to a client device. The first packet is encrypted with a reference key and is designated as a reference packet. A number of packets of the encrypted media that follow the first packet are selected. For each of one or more selected packets, an XOR operation is performed on the respective selected packet with the reference packet. Result values of the XOR operation are rearranged by a shuffle key and divided into segments. Each of the segments is assigned to an even list or an odd list, which are combined to form a respective encrypted packet. The respective encrypted packet is designated as a non-reference packet and is transmitted to the client device.
Wireless internet access module, communication method for host and wireless internet access module, and data card
A communication method for a host and a wireless Internet access module, and a data card, are provided so that the host implements wireless Internet access with the wireless Internet access module of a secure digital interface. The method includes simulating each port on a wireless Internet access processing function unit in a wireless Internet access module into a secure digital card partition and reporting the secure digital card partition to a host side; receiving downlink interaction information from the host side encapsulated in a secure digital card interface format, decapsulating the downlink interaction information, and delivering the decapsulated downlink interaction information to a corresponding port; and receiving uplink interaction information reported to the host side from each port, encapsulating the received uplink interaction information in the secure digital card interface format.
Control system for resource selection between or among conjoined-cores
A processing system is provided for processing signals in a processor system including first and second conjoined-cores, and sharing a single floating point unit or a single memory interconnection network port by the first and second conjoined-cores.
Data processing apparatus and data processing method
A data processing apparatus includes a connecting unit that distributes the plurality of processing modules over the stages, and connects the plurality of processing modules such that a plurality of partial data are processed in parallel. The data processing apparatus detects, with respect to at least a part of the stages, a ratio of an amount of data for which processing in the subsequent stage has been executed, as a passage rate, acquires a processing time for a data amount to be processed in each stage, for which the passage rate was detected, based on the passage rate, and determines the number of processing modules distributed to each stage based on the data amount.
Generating hardware accelerators and processor offloads
System and method for generating hardware accelerators and processor offloads. System for hardware acceleration. System and method for implementing an asynchronous offload. Method of automatically creating a hardware accelerator. Computerized method for automatically creating a test harness for a hardware accelerator from a software program. System and method for interconnecting hardware accelerators and processors. System and method for interconnecting a processor and a hardware accelerator. Computer implemented method of generating a hardware circuit logic block design for a hardware accelerator automatically from software. Computer program and computer program product stored on tangible media implementing the methods and procedures of the invention.
Address generation unit using end point patterns to scan multi-dimensional data structures
A system in accordance with the invention may include a data memory storing a multi-dimensional (e.g., a two-dimensional) data structure. An address generation unit is provided to calculate real addresses in order to access the multi-dimensional data structure in a desired pattern. The address generation unit may be configured to calculate real addresses by moving across the multi-dimensional data structure between pairs of end points. The pairs of end points (as well as parameters such as the step size between the end points) may be pre-programmed into the address generation unit prior to accessing the multi-dimensional data structure. A processor, such as a vector processor, may be configured to access (e.g., read or write data to) the data structure at the real addresses calculated by the address generation unit.
Data caching in non-volatile memory
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, can perform data caching. In some implementations, a method and system include receiving information that includes a logical address, allocating a physical page in a non-volatile memory structure, mapping the logical address to a physical address of the physical page, and writing, based on the physical address, data to the non-volatile memory structure to cache information associated with the logical address. The logical address can include an identifier of a data storage device and a logical page number.
Flexible control mechanism for store gathering in a write buffer
A store gathering policy is enabled or disabled at a data processing device. A store gathering policy to be implemented by a store buffer can be selected from a plurality of store gathering polices. For example, the plurality of store gathering policies can be constrained or unconstrained. A store gathering policy can be enabled by a user programmable storage location. A specific store gathering policy can be specified by a user programmable storage location. A store gathering policy can be determined based upon an attribute of a store request, such as based upon a destination address.
Method and system for managing storage units
Method and system for managing storage units are provided. A free space module scans a storage unit data structure and a reference data structure to generate an intermediate data structure that identifies storage units that are not referenced by any storage unit client. A lookup module is initiated and the storage unit clients are notified that all new references to any storage unit should be verified with the lookup module. The free space module then verifies if any of the storage units in the intermediate data structure have been referenced since the intermediate data structure was created. Any referenced storage units are removed from the intermediate data structure and a data structure identifying unreferenced storage units is generated. The data structure is then used to allocate the identified storage units.
Methods and systems for data cleanup using physical image of files on storage devices
Methods, systems, and computer program products are provided for optimizing selection of files for eviction from a first storage pool to free up a predetermined amount of space in the first storage pool. A method includes analyzing an effective space occupied by each file of a plurality of files in the first storage pool, identifying, from the plurality of files, one or more data blocks making up a file to free up the predetermined amount of space based on the analysis of the effective space of each file of the plurality of files, selecting one or more of the plurality of files as one or more candidate files for eviction, based on the identified one or more data blocks, and evicting the one or more candidate files for eviction from the first storage pool to a second storage pool.
Tiered storage system configured to implement data relocation without degrading response performance and method
An example of an information storage system includes physical storage drives for providing real storage areas to a pool which is tiered into tiers different in performance, and a controller. The controller monitors accesses in a first tier in the pool. The controller determines a loaded state of the first tier based on the accesses to the first tier. The controller holds management information relating loads to the first tier to relocation speeds and/or modes of moving data in data relocation between a second tier in the pool and the first tier. The controller determines at least one of a relocation speed and a mode of moving data in data relocation between the second tier and the first tier based on the determined loaded state of the first tier and the management information.
Transparent file system migration to a new physical location
Transparent file system migration including a method that identifies a source physical storage location in a file system that supports simultaneous access by multiple independent processes. A target physical storage location in the file system is identified and its contents are migrated to the target physical storage location. The migrating includes disallowing new allocations to the source physical storage location and copying contents from the source physical storage location to the target physical storage location. A write request to write data to the source physical storage location is received prior to or during the migrating. The write request is serviced contemporaneously with the migrating. Read and write requests directed to the source physical storage location are redirected to the target physical storage location. The redirecting is responsive to the migrating completing. The requests are from the multiple independent processes and include both logical and physical input/outputs.
Microcomputer and method for controlling memory access
A microcomputer includes a CPU, a protection information storage configured to store memory protection information specifying an access permission or a prohibited state to a memory space by a program executed by the CPU, a memory access control apparatus configured to determine whether or not to allow a memory access request from the CPU according to the memory protection information, and a reset apparatus configured to invalidate the memory protection information stored in the protection information storage according to a reset request signal output from the CPU to a switching of programs executed by the CPU, the reset request signal being based on a state of execution of the program by the CPU. The reset apparatus sets all valid bit storing fields of a plurality of protection setting registers of the protection information storage to invalid state in response to the reset request signal output by the CPU.
Mechanism for persisting messages in a storage system
A plurality of storage nodes in a single chassis is provided. The plurality of storage nodes in the single chassis is configured to communicate together as a storage cluster. Each of the plurality of storage nodes includes nonvolatile solid-state memory for user data storage. The plurality of storage nodes is configured to distribute the user data and metadata associated with the user data throughout the plurality of storage nodes such that the plurality of storage nodes maintain the ability to read the user data, using erasure coding, despite a loss of two of the plurality of storage nodes. The plurality of storage nodes configured to initiate an action based on the redundant copies of the metadata, responsive to achieving a level of redundancy for the redundant copies of the metadata. A method for accessing user data in a plurality of storage nodes having nonvolatile solid-state memory is also provided.
Hash value comparison during crash-tolerant incremental change tracking between backups of a source storage
Hash value comparison during crash-tolerant incremental change tracking between backups of a source storage. In one example embodiment, a method includes assigning each block in a source storage into one of multiple zones, creating a nonvolatile zone map, tracking each of the zones that is changed between a first point in time and a second point in time, identifying, as potentially changed zone blocks, the blocks in the source storage assigned to any zone marked as changed in the nonvolatile zone map, identifying, as potentially outdated backup blocks, the most recently backed-up blocks in one or more prior backups that correspond to the potentially changed zone blocks, calculating source hash values of the potentially changed zone blocks, calculating backup hash values of the potentially outdated backup blocks, and comparing the source hash values to the backup hash values to determine which blocks in the source storage actually changed.
Emulation of a dynamic address translation with change record override on a machine of another architecture
A translation table entry contains a change recording override field for controlling whether a change bit is to be set on a store or not. Each 4K byte block of main storage has an associated storage key comprising a change bit. The change recording override field controls whether change bit of the storage key associated with the desired 4K byte block of main storage is set to 1 for a store operation.
Apparatus for storing/reading data in a memory array of a transponder
An apparatus for storing or reading data in a memory array of a transponder and a corresponding transponder, read/write device and program element is described. Therein, a data file system for storing data within the memory array is defined by a predetermined protocol. The storing additional data includes checking whether a memory size of the application data file is larger than the memory size indicated by the application data length indicator; and storing second application data in a partial memory area of the application data file not occupied by the first application data. Thereby, memory areas which, according to the predetermined protocol, are not used can be used for new applications, data can be hidden in these areas such that they can not be read by protocol compliant reader devices and the data structure read or written is compatible with the former predetermined protocol.
Multi-core processing device with invalidation cache tags and methods
A data processing device is provided that facilitates cache coherence policies. In one embodiment, a data processing device utilizes invalidation tags in connection with a cache that is associated with a processing engine. In some embodiments, the cache is configured to store a plurality of cache entries where each cache entry includes a cache line configured to store data and a corresponding cache tag configured to store address information associated with data stored in the cache line. Such address information includes invalidation flags with respect to addresses stored in the cache tags. Each cache tag is associated with an invalidation tag configured to store information related to invalidation commands of addresses stored in the cache tag. In such embodiment, the cache is configured to set invalidation flags of cache tags based upon information stored in respective invalidation tags.
Data processing apparatus and method for reducing storage requirements for temporary storage of data
An instruction cache stores cacheable instructions for access by a processing circuitry, the instruction cache having a data storage comprising a plurality of cache lines and a tag storage comprising a plurality of tag entries, each cache line for storing instruction data specifying a plurality of cacheable instructions, and each tag entry for storing an address identifier for the instruction data stored in an associated cache line. The instruction cache including valid flag storage for identifying whether each cache line is valid. Instruction cache control circuitry is arranged to store within a selected cache line of the data storage the instruction data for a plurality of cacheable instructions as retrieved from memory, to store within the tag entry associated with that selected cache line the address identifier for that stored instruction data, and to identify that selected cache line as valid within the valid flag storage.
Multi-ported memory with multiple access support
A multi-ported memory that supports multiple read and write accesses is described herein. The multi-ported memory may include a number of read/write ports that is greater than the number of read/write ports of each memory bank of the multi-ported memory. The multi-ported memory allows for at least one read operation and at least one write operation to be received during the same clock cycle. In the event that an incoming write operation is blocked by the at least one read operation, data for that incoming write operation may be stored in a cache included in the multi-port memory. That cache is accessible to both write operations and read operations. In the event than the incoming write operation is not blocked by the at least one read operation, data for that incoming write operation is stored in the memory bank targeted by that incoming write operation.
Method and apparatus for querying for and traversing virtual memory area
Embodiments of the present invention disclose a method and an apparatuses for querying for and traversing a virtual memory area. The method includes: determining whether a virtual memory area (vma) corresponding to a query address is in an adjacent range of a cached vma, and if the vma corresponding to the query address is in the adjacent range of the cached vma, querying for the vma by using a thread on a node of a threaded red-black tree. Since an adjacent range of the cached vma can always be determined, the hit rate of accessing the cache is improved, and the time complexity of implementing the whole vma traversal is O(n), thereby improving vma query efficiency.
Control apparatus and method, and storage apparatus
In a storage apparatus, in the case where a data block to be written to a storage medium is a zero data block containing only zero data, a zero data information memory stores zero data identification information indicating that the data block is a zero data block. A control apparatus receives a data block from an access requesting apparatus in association with a write request issued by the access requesting apparatus for writing the data block a specified number of times to a predetermined storage area of the storage medium, and when determining that the data block is a zero data block containing only zero data, sets zero data identification information in the zero data information memory, and when completing the setting of the zero data identification information, sends the access requesting apparatus a completion notice of the writing to the storage medium.
Protected mode for global platform compliant smart cards
A multiple application smart card (102) uses hardware firewalls (130) and an internal communications scheme to isolate applications from different service providers. A first application (116) from a first service provider is stored within a first supplemental security domain (SSD) (126) of a memory device on the multiple application smart card (102). A second application (116) from a second service provider is stored within a second SSD (128) of the memory device. A hardware firewall (130) is located between the first and second applications (116) of the first and second SSDs (128). The hardware firewall (130) prevents direct data access between the first and second applications (116) of the first and second SSDs (128).
Methods and apparatus providing high-speed content addressable memory (CAM) search-invalidates
Embodiments of a Content Addressable Memory (CAM) enabling high-speed search and invalidate operations and methods of operation thereof are disclosed. In one embodiment, the CAM includes a CAM cell array including a number of CAM cells and a valid bit cell configured to generate a match indicator, and blocking circuitry configured to block an output of the valid bit cell from altering the match indicator during an invalidate process of a search and invalidate operation. Preferably, the output of the valid bit cell is blocked from affecting the match indicator for the CAM cell array beginning at a start of the invalidate process and continuing until an end of the search and invalidate operation.
Relocating data based on matching address sequences
A data storage device includes a non-volatile memory that includes a three-dimensional (3D) memory. A controller of the data storage device is configured to store a first sequence of addresses based on a first sequence of read instructions received from a host device. Subsequent to storing the first sequence of addresses, the controller is configured to receive a second sequence of read instructions from the host device and to determine whether a second sequence of addresses that is based on the second sequence of read instructions matches the first sequence of addresses. The controller is configured to relocate at least one page of the non-volatile memory at least partially based on the second sequence of addresses matching the first sequence of addresses.
Method for adjusting storage space of partition of embedded multimedia card and terminal
A method is provided for adjusting a storage space of a partition of an embedded multimedia card and a terminal. The method includes: determining a current external SD card mode of a terminal, where the external SD card mode includes an external SD card installed mode or an external SD card uninstalled mode; receiving instruction information, where the instruction information is used for instructing the terminal to switch from the external SD card uninstalled mode to the external SD card installed mode, or used for instructing the terminal to switch from the external SD card installed mode to the external SD card uninstalled mode; and adjusting a size of a storage space of a partition of an embedded multimedia card according to the instruction information.
Controller with extended status register and method of use therewith
The embodiments described herein provide a controller with an extended status register and a method of use therewith. In one embodiment, a controller is provided with a first interface through which to communicate with a host and a second interface through which to communicate with a plurality of flash memory devices. The controller also comprises a status register, an extended status register, and a processor. The processor is operative to store, in the extended status register, status information of a plurality of events in time across the plurality of flash memory devices. The extended status register stores event status information, whereas the ONFI status register stores command status information. In response to a request from the host, the processor sends the status information of the plurality of events to the host for analysis.
Disc device provided with primary and secondary caches
In a disc device according to the present invention, when a controller 2 abandons a block from a cache memory 4 used as a primary cache, it is determined whether or not the number of readings of data in the block exceeds the specified number of times. Only when the number of readings exceeds the specified number of times, the block is written into an SSD 8 used as a secondary cache. When the number of readings is equal to or smaller than the specified number of times, the block is rewritten into an HDD 7.
Automation control component
Embodiments of the present disclosure are directed toward an automation control device including a base having a module slot, a functional module including communication and control circuitry configured to communicatively couple with the base via the module slot, a terminal block configured to communicatively couple the base and the first functional module with field wiring, a first power bus configured to transmit a first power to the functional module, and a second power bus configured to transmit a second power to the functional module.
Optimistic interrupt affinity for devices
A computing apparatus determines that a virtual processor of a guest has been moved from a first physical processor of a host to a second physical processor of the host. The computing apparatus identifies a device that is controlled by the virtual processor, wherein device interrupts for the device are forwarded to the virtual processor. The computing apparatus updates at least one of the device or an interrupt controller to cause at least one of the device or the interrupt controller to send the device interrupts to the second physical processor of the host, wherein the second physical processor of the host forwards the device interrupts to the virtual processor running on the second physical processor without generating an inter-processor interrupt.
Connector apparatus and associated method for bridging data between data sources and data targets
A connector apparatus and the associated method are provided for bridging data between entities, such as between data source(s) and data target(s). In a method, first and second data bridge connections are established between a connector apparatus and a data source and between a connector apparatus and a data target, respectively. Each data bridge connection includes a data pipe having one or more data flows with each data flow dedicated to a particular data type. The method includes sending a polling request from the connector apparatus to the data source via the first data bridge connection and receiving data from the data source over the first data pipe in response to the polling request. The method includes sending the received data to the data target over the second data pipe when the data target has subscribed to the data received from the data source over the first data pipe.
Flow control for a Serial Peripheral Interface bus
Systems and methods for flow control within a Serial Peripheral Interface without additional signal lines are included herein. In one example, a method includes generating a flow control command. The method also includes sending the flow control command from a master device to a slave device with a Serial Peripheral Interface. In addition, the method includes sending a memory address from the master device to the slave device. Furthermore, the method includes detecting a ready indicator in the master device. The method also includes waiting to receive a ready indicator and communicating with the slave device in response to the ready indicator.
PCI express fabric routing for a fully-connected mesh topology
A PCIe Fabric that includes an IO tier switch, hub tier switches, and a target device connected to one of the hub tier switches. The IO tier switch is configured to receive a TLP from a client, make a determination that an address in the TLP is not associated with any multicast address range in the first IO tier switch and is not associated with any downstream port in the first IO tier switch, and, based on the determinations, route the TLP to the first hub tier switch via a upstream port on the IO tier switch. The hub tier switch is configured to make a determination that the TLP is associated with a multicast group, and, based on the determination, generate a rewritten TLP and route the rewritten TLP to a target device via a downstream port on the hub tier switch.
Compound storage system and storage control method
A shared device unit, which comprises a storage device, is coupled to a plurality of storage systems. The shared device unit provides a plurality of storage areas, which are based on the storage device, to the plurality of storage systems. Each storage system stores allocation management information which comprises an ID of a storage area provided to thereof among the plurality of storage areas, and provides the storage area corresponded to the ID included in the allocation management information to the host computer coupled thereto among the plurality of host computers.
Buffer circuit and semiconductor integrated circuit
A buffer circuit includes: a register array including registers in a plurality of stages; and a control circuit configured to rearrange a plurality of pieces of received data in the register in a determined transfer order and to control the register array to sequentially output the plurality of pieces of received data as one piece of transfer data when all the received data is stored, wherein the control circuit controls the register array to store stored data in each register in a preceding stage when the register array outputs the received data, and the control circuit determines a write register in accordance with the transfer order when the register array newly stores the received data and controls the register array to store data stored in the write register in a following stage of the write register and to store the new received data in the write register.
Sharing IOMMU mappings across devices in a DMA group
A method that includes creating a DMA group, adding a first I/O device to the DMA group, and adding a second I/O device to the DMA group. The method further includes instructing an I/O MMU to create a shared virtual DMA address, mapping a memory location to the shared virtual DMA address in the DMA group translation table, and providing the shared virtual DMA address to the device drivers. The method further includes determining that the first I/O device has received DMA group data, instructing a first DMA controller to transfer the DMA group data from the first I/O device to the shared virtual DMA address, determining that the shared virtual DMA address has received the DMA group data, and instructing a second DMA controller to transfer the DMA group data from the memory location corresponding to the shared virtual DMA address to the second I/O device.
Identifying anomalies in original metrics of a system
An anomalous component within a processing system is identified. One or more transformed metrics of a processing system being monitored are analyzed, and an anomaly in the processing system is detected. Based on detecting the anomaly, at least one transformed metric is inversely transformed to obtain at least one suspect original metric. Using the at least one suspect original metric, the anomalous component is identified.
Automatic attachment and detachment for hub and peripheral devices
A device comprises circuitry and a transceiver. In operation, the device is configured to cause the transceiver to: receive a first message from another device to support at least one aspect of attachment of the device and the another device, send, to the another device, a second message after the first message and prior to attachment, receive, from the another device, a third message that is sent after the second message and prior to attachment, send, to the another device, a fourth message after the third message and prior to attachment, receive, from the another device, a fifth message that is sent after the fourth message and prior to attachment, and send, directly to the another device, data utilizing at least one channel for data transfer utilizing a second one of the addresses for identification in association with the device on the shared wireless communication medium.
Namespace access control in NVM express PCIe NVM with SR-IOV
A method implemented by a non-volatile memory (NVM) controller comprising obtaining a NVM express (NVMe) command comprising a namespace identifier (NSID) from a host memory via a peripheral component interconnect express (PCIe) function, determining a mapping between the PCIe function and a namespace identified by the NSID based on a data structure stored in a PCIe memory address space, and accessing the namespace based on the mapping between the PCIe function and the namespace.
Input device for controlling multiple computers and the controlling method thereof
An input device for controlling multiple computers includes a storing unit, a sensing unit, a controlling unit, and a transmitting unit. The controlling unit calculates a moving direction and a displacement value of the input device according to the sensing unit to determine one of the computers which the input device is in control of and generates an input command for it. The input command includes identification of the controlled computer and is transmitted to multiple computers. The computer corresponding to the identification performs the input command. The moving direction corresponds to a pointer direction of the computer. The controlling unit accumulates the displacement value to be a first accumulated displacement value when the input device moves toward to a first pointer direction. When the first accumulated displacement value is larger than a threshold value, the controlling unit switches the input device to control another one of computers.
Management of B2B communities
A method for managing a B2B electronic commerce community, wherein a plurality of B2B partners interact with a hub entity via a plurality of B2B applications, includes receiving interaction information describing interactions of a B2B partner with at least one of the B2B applications. The interaction information may describe a material flow, correspondence, transactions, notices, relationships, and so forth, between the B2B partner and the hub. Based at least in part on the received interaction information, the method develops a community manager that supports a common set of community management modules in communication with each of the B2B applications and maintains a single, hub-wide view of each of the B2B partners. The modules may include, as examples, modules for new partner on-boarding, community maintenance, improvement, and networking including social network tooling.
Mass generation of individual virtual servers, virtual web sites, and virtual web objects
Techniques for inducing a contact to invoke a resource prepared by a promoter when the resource resides on a network include generating a resource location description for the resource that includes a name of the contact. The promoter provides access to the resource at a location on the network according to the resource location description and also prepares a message to notify the contact about the resource location description. Thus a promoter can provide a website for each contact whom the promoter has identified, the website having a domain name that prominently displays the contact's identity. The displayed website content is determined according to the website domain name for the contact. The system may optionally maintain a record of access for a particular website domain and display website content that is determined according to the frequency and type of prior access to the website domain.
Running applications in an online or offline mode based on the availability of the connection to the remote web server
Systems and methods for implementing online and offline applications are described. Such systems and methods may in some cases provide the same programming interface, regardless of whether the application is online or offline. Such systems and methods may also or instead in some cases provide additional or other possible capabilities, including installation without elevated privileges, simplified data synchronization, sharing of applications and application data, access to data from other applications, and richer client functionality than may be provided by an application such as a web browser.
System and method for exchanging information in a mobile wireless network environment
A method is provided in one example embodiment and includes communicating a message to a remote data plane element in order to request a data plane resource for hosting a session. The method also includes receiving a response at a network element acknowledging the message. Data plane traffic is managed at the remote data plane element based on enforcement rules. The enforcement rules are provisioned in a table element at the remote data plane element, and the table element reflects a portion of a master table element included in the network element.
Controlling third party access to network devices
A device may receive a command from a source device, may receive information that identifies a destination device associated with the command, may receive information that identifies a user associated with the source device, and may determine a network condition of a network associated with the destination device. The device may determine that the user is associated with an available token, where the available token is associated with the user, the command, and the network condition. The device may transmit, to the destination device and based on determining that the user is associated with the available token, the command.
System and method for air-to-ground data streaming
A method for air-to-ground data streaming includes receiving data, by a processor aboard an aircraft, from an LRU aboard the aircraft, encoding the data according to a data map received from a ground station, and transmitting the encoded data in real time to the ground station via a transmission link selected by a dynamic link manager, configured to identify and select a most efficient data path.
A computer assigns networks to network zones based on predefined properties for each zone and/or the properties of the networks. An application program installed on the computer provides the computer with preference information that indicates the network zone whose network policies or properties are best suited for the application program. Thereafter, when executing the application program, the computer limits network contact for the application program to the network(s) that is assigned to the network zone(s) identified as a preferred network zone(s) or identified by a preferred network property or properties by the preference information from the application program.
Optimizing electronic communication channels
A method, computer program product, and system for electronic communication is described. A first unified telephony session is selected. A first arbitrator associated with the first session is selected. A first set of participants associated with the first session is selected. The first arbitrator is directed to act as a proxy connection for a first channel associated with the first set of participants.
Receiving an unlimited number of data items modified by a web transaction
A system and associated method for receiving an unlimited number of data items modified by a Web transaction. A processor requests a service from a Web-service program by sending the service program a set of data items and a client identifier. The Web-service program responds with a Web-interface program identifier and a user session identifier. The processor uses the session identifier, the Web-interface program identifier, and a storage location of the data items to open a session with a Web-interface program, during which the processor directs the Web-interface program to modify the data items and store them on a data storage device without interacting with the Web-service program. When the user session terminates, the processor requests from the Web-service program the modified data items and the Web-service program sends the data items to the processor without involvement of the Web-interface program.
Home hub for IP multimedia subsystem (IMS)/Web services interaction
Systems and methods for home hub for IMS/Web services interaction are described. In one aspect, a data communication gateway operating as a home hub includes a processor that executes computer program instructions to provide IMS/Web services interaction to one or more client computing devices. The client computing device(s) are operatively coupled to the home hub. The client computing device(s) are not Session Initiation Protocol (SIP)-enabled devices. To provide SIP- or IMS-based services to such client computing devices, the home hub registers on behalf of the client computing device(s) to a SIP network. The home hub replies to SIP messages on behalf of the SIP network registered device(s) to process all SIP request(s) and provide the registered device(s) with corresponding SIP-based service(s).
Multimedia session management
A multimedia provider (100) generates, based on a request for a media channel from a user terminal (10), a session set-up description that is returned to the user terminal (10). The description defines, when processed in the terminal (10), a session window (20) that is displayed on a screen (12) of the terminal and comprises a region (22) for displaying media data of a requested channel and a channel region (24) comprising information on alternative available media channels. The description also defines a binding between user inputs (14) of the terminal (10) and identifiers of the alternative channels. The set-up description allows for a user-friendly channel switch by automatically transmitting a channel switch request to the multimedia provider (100) upon a triggering of the user input (14) that is associated with the identifier of the requested media channel. The description, thus, provides a visually appealing graphical interface and simultaneously allows for a user-friendly media channel switch.
Point of presence management in request routing
A system and method for the management of client computing device DNS queries and subsequent resource requests within a content delivery network service provider domain are provided. The management of the DNS queries can include the selection of computing devices corresponding to various Point of Presence locations for processing DNS queries. Additionally, the management of the content requests can include the selection of computing devices corresponding to resource cache components corresponding to various Point of Presence locations for providing requested content. The selection of the computing devices can incorporate logic related to geographic criteria, testing criteria, and the like.
Method and system for network transaction monitoring using transaction flow signatures
A method and system for monitoring performance of network transactions is described herein. According to the present invention, in a testing environment, transaction flow signatures representing a hierarchical flow of sub-transactions constituting the said network transactions are generated and stored for monitoring and analysis of the network transactions. In a real-time environment, the sub-transactions are identified through the stored transaction flow signatures for a particular network transaction and the identified sub-transactions are then monitored by metrics analysis engine to determine the performance of the network.
Event collection method and information processing apparatus
An event collection method collects an event from a sensor network, the method includes: retrieving on a per process basis for a module, based on a module definition information and an occurred event information, an occurrence node identifier categorized by an attribute value corresponding to an attribute name, with input event type associated with an occurred event type; determining, when there is a single retrieved occurrence node identifier with respect to the process of the module, a node identified by the occurrence node identifier as an installation destination of the module that is identified by the module identifier; referencing, when there is a plurality of retrieved occurrence node identifiers with respect to the process of the module, a connection relation information of nodes and determining an upper node common to the plurality of occurrence node identifiers as an installation destination of the module identified by the module identifier.
Communication device, communication system, setting method, setting program, and setting circuit
In order to automatically set information of a maintenance entity group end point device into a communication device only by using periodically transmitted and received supervision frames without the need for a specifically defined frame, a maintenance entity group end point device is equipped with: a receiving unit for receiving supervision frames; a management table for managing identification information of the maintenance entity group end point devices that are transmission sources of the supervision frames; and a registering unit for, in a case that identification information of a maintenance entity group end point device that is a transmission source of a supervision frame received by the receiving unit is not registered in the management table, registering the identification information of the maintenance entity group end point device into the management table.
Determining an average effective data through-put as corresponds to a network-served end user
A network monitoring apparatus in a communications network detects TCP data flows (to at least one network-served end user) to provide corresponding detected data flows. This apparatus then measures data throughput to this (or these) end user(s) via the TCP data flows and during the TCP data flows and calculates an average effective data throughput to this end user. This calculation can be based, by one approach, upon use of time variables that represent the detected data flows (to effectively gamer a beginning-to-end view oft be various TCP data flows while avoiding inclusion of periods that represent no (or possibly only a little) volume in these regards as may be due to application idle time or end-user idle time while including periods that represent no (or possibly only a little) volume due to network buffering, device performance problems, and so forth).
Methods, devices, and computer program products for providing a computing application rating
A rating is provided for a computing application. Traffic data, power data, and/or network signaling load data is collected for a computing application and compared with other similar data. A rating for the computing application is provided based on the comparison.
Information processing apparatus, information processing method, and program
An apparatus and method provide logic for formatting electronic content. In one implementation, an apparatus includes an identification unit configured to identify a plurality of devices associated via a network, and a receiving unit configured to receive information corresponding to the associated devices. The information includes a function provided by the associated devices and performance data corresponding to the associated devices. A generation unit is configured to generate a first value of an execution metric describing at least one of an execution of the function by the associated devices or the performance data corresponding to the associated devices, based on at least the received information, and an output unit is configured to output the first metric value.
Method and a system for managing a website using profile key patterns
A set of n profile key parameters is selected, the set of n profile key parameters defining an n-dimensional profile key. Content for a website is created while assigning profile key values to the content, each profile key value being associated to a profile key parameter. A plurality of visitors is allowed to visit the website. For each visitor, the behavior of the visitor is monitored, and a profile key for the visitor is generated in accordance with content viewed and/or actions taken by the visitor, and in accordance with the profile key values assigned to the content of the website. The generated profile key thereby reflects behavior and preferences of the visitor. One or more patterns of profile keys are identified, based on an analysis of the profile keys. The patterns of profile keys are stored in a storage device of the server.
Method for creating content, method for tracking content use actions, and corresponding terminal and signals
A method is provided for tracking at least one use of at least one piece of multimedia content on a terminal connected to a communication network. The piece of content is transmitted to the terminal in the form of at least one description file generated according to a predetermined description format. The method includes using the piece of content by a user of the terminal, including activation of at least one interaction element; implementing at least one instruction followed by the use associated with the activated interaction element; executing the use tracking instruction controlling storage of at least one piece of information concerning the activation of the interaction element, or use tracking information; and transmitting by the terminal the piece of use tracking information to a tracking terminal in charge of processing the use tracking information.
Efficient port management for a distributed network address translation
A central NAT manager efficiently allocates ports to endpoints of a tenant application in a hosting environment for NAT purposes. In some instances, the central NAT manager may pre-allocate ports to endpoints as part of the initial configuration of the tenant application. The pre-allocation process may include persisting pre-allocated port state information in storage and configuring endpoints and a NAT device with the pre-allocated port state information. Additional ports may be dynamically allocated to endpoints during runtime using dynamically determined port allocation sizes. In other instances, the central NAT manager may reserve ports for endpoints during the initial configuration of the tenant application by assigning ports to endpoints and persisting port assignment information to storage. During runtime, endpoints may issue port allocation requests to the central NAT manager, which may allocate ports to the endpoints from the range of ports initially reserved for each endpoint.
Bios parameter virtualization via BIOS configuration profiles
Techniques presented herein provide approaches for generating a markup language object that describes a variety of BIOS setup variables and which allow the markup language object to be passed to the management system, as well as allow retrieval of a normalized BIOS from the management system. Doing so allows the management system to be used to easily and efficiently control a large number of server systems within a data center.
Mobile peer-to-peer based network apparatus and system
A Peer-to-Peer (P2P)-based network apparatus and system is provided. The P2P-based network apparatus may sense the movement of a mobile station (MS), select a candidate proxy, and change a proxy of the MS to the candidate proxy.
Electronic space and method for providing resources to facilitate ideation
A method and system are provided for organizing and assembling information and resources for display as part of an electronic space supported on a network. The electronic space preferably resembles a room. The room is decorated with selected images that may be iconic representations that activate links to specific resources such as databases, technical information, word processing applications, etc., that are user selected to support idea conception and evaluation to promote creativity, innovation and improved problem solving. The electronic space enables a user to customize an on-line workplace with decorations as well as active links to selected resources which may include human resources such as colleagues, co-workers or expert.
System and method for connection efficiency
In a distributed object computing system, a server application may create multiple, uniquely identified, server contexts that each provide one or more services to a service consumer (client). Instead of creating a connection to a client for each server context, a single connection can be used. A service request handler may be configured to handle service requests for each server context. Service requests may be generated in the client with a service context identity. When a service request is received by the server application, the service request handler resolves the service context identity and forwards the service request to the appropriate server context.
Method and apparatus for reproducing content in multimedia data providing system
A content reproducing method is provided for continuously reproducing content being reproduced by a client device in another client device in a multimedia data providing system including a server for providing content and a plurality of client devices for reproducing the content provided by the server. The method includes reproducing, by a first device, multimedia content being streamed by a content server; and transmitting, by the first device, a first request message for continuously reproducing content being reproduced by the first device in another device and an IDentification (ID) of the first device to another device using local area communication in order to continuously reproduce the content being reproduced by the first device in another device.
Branded and comarketed domain-based thick client system
Systems and methods of the present invention allow for a thick client which may be provided with a domain name in a partnership between a hosting provider, an ISP and/or a thick client retailer. The client may be used to access a remote computer or server in the hosting provider's data center.
Automated desktop placement
Systems and methods are presented for enabling a user to provide rules for the placement of computing resources at a data center for an entity that employs or is associated with the user. The data center can use the placement rules to select a data center computer system to host computing resources for a user. The rules can be used to establish diversity in computing resource placement at the data center thereby reducing the number of users who lose access to computing resources when a specific data center computer suffers a failure. Further, the placement rules can be used to facilitate configuration of the computer resources for the user based, for example, on the user's employment responsibilities.
Methods and systems for distributing and accessing content associated with an e-book
Exemplary methods and systems for distributing and accessing content associated with an e-Book are disclosed herein. An exemplary method includes a content management subsystem receiving data representative of additional content associated with a particular passage of an e-Book from a first e-reader device and transmitting the data representative of the additional content to a second e-Book reader device for presentation in conjunction with the particular passage of the e-Book. Corresponding methods and systems are also disclosed.
Method and system for mediated access to a data facade on a mobile device
A content delivery system, a mobile subscriber terminal and method for mediated access to a data facade are generally described herein. In some embodiments, the mobile subscriber terminal includes one or more applications that may request advertisements, a mediator client, and a delivery client operating as a data facade that interfaces with a delivery server. The mediator client may generate an application profile based on advertising preferences of the applications and may register with the data facade using the application profile. The mediator client may identify, filter and select advertisements to provide targeted content in response to requests from the applications.
Delayed publishing in process control systems
Techniques for delaying the publication of data to a network by a device in a process control system or plant include obtaining, at the device, data to be published to the network; storing the obtained data and a corresponding timestamp in a cache; triggering a publication of cached data; and, based on the trigger, publishing the oldest cached data to the network during the publishing timeslot assigned to the device. The cached data may correspond to a sample rate of the device and may include multiple instances of data obtained over time. The device includes a network interface, a cache, and a publisher, and the device may be configured to operate in the delayed publishing mode, or to operate in an immediate publishing mode in which currently obtained data that has not been cached is published to the network during the publishing time slot assigned to the device.
Remote direct memory access socket aggregation
Byte utilization is improved in Remote Direct Memory Access (RDMA) communications by detecting a plurality of concurrent messages on a plurality of application sockets which are destined for the same application, client or computer, intercepting those messages and consolidating their payloads into larger payloads, and then transmitting those consolidated messages to the destination, thereby increasing the payload-to-overhead byte utilization of the RDMA transmissions. At the receiving end, multiplexing information is used to unpack the consolidated messages, and to put the original payloads into a plurality of messages which are then fed into the receiving sockets to the destination application, client or computer, thereby making the consolidation process transparent between the initiator and the target.
Systems and methods relating to communication within a fabric network are presented. The fabric network includes one or more logical networks that enables devices connected to the fabric to communicate with each other using various profiles known to the devices. A device sending a message may follow a general message format to encode the message so that other devices in the fabric may understand the message regardless of which logical networks the devices are connected to. Within the message format, a payload of data may be included for the receiving device to forward, store, or process the message. The format and the contents of the payload may vary according to a header within the payload that indicates a profile and a message type within the profile. Using the profile and message type, the receiving devices may decode the message to process the message.
Web feed presence
Web feed presence techniques are described herein. In an implementation, a method includes obtaining a web feed describing content of the user and presence data of the user. The web feed is output with the presence data concurrently.
Performance management system using unsolicited feedback
A system and method for designating or tagging an electronic message, such as an email that includes feedback about an employee's performance. The tagged email can then be automatically embedded within, or otherwise associated with, a performance management document such as a performance review. An example method includes providing a user interface display screen, whereby a user may view contents of an electronic message; providing a first user option, in association with the user interface display screen, to selectively designate the electronic message for a predetermined purpose and providing a signal in response thereto; and associating the electronic message with a document in response to the signal in accordance with a designation of the electronic message. In a specific embodiment, the designation of the electronic message includes a feedback designation, such that the electronic message is designated as a feedback message. The feedback message represents unsolicited feedback. The step of associating includes embedding the electronic message in the document, which may include a performance review document.
Method and device for concentrating messages for the integration simulation of components
A method and a device are disclosed for concentration of messages transmitted by at least two separate transmitters in a communication network to which there are connected these transmitters and an addressee of the data contained in the messages. After receiving the messages to be concentrated, the data contained in these messages are extracted. A concentration frame comprising the extracted data and at least one information item making it possible to identify the addressee is then constructed and transmitted The size of the concentration message is smaller than the maximum size of the data packets exchanged in the communication network.
Automatically enabling the forwarding of instant messages
Techniques are described for forwarding an instant message addressed to an intended instant messaging recipient to the recipient's mobile telephone when the recipient's mobile telephone number is known to the instant message sender. In one example, an instant message is forwarded to the intended recipient's mobile telephone number when the instant message sender's contact information for the intended recipient includes an instant message address (e.g., a screen name or other type of instant message identifier) and a mobile telephone number, without dependence upon the intended recipient's presence on the instant message (IM) system or through actual login or registration with an IM forwarding service. In a more particular example, an address book of the instant message sender includes an entry for the intended recipient where the entry includes an instant message address and a mobile telephone number of the intended recipient.
Method, apparatus and system for social networking
A method, apparatus and system for social networking is provided. In an embodiment, the system comprises a plurality of mobile devices that can directly connect to each other via a peer-to-peer connection. The devices can additionally connect to a server. The server maintains a profile schema which can be used to generate profiles for users for each of the mobile devices.
Display device, terminal device, display system, display method, and image alteration method
A display device includes: a display-side communication section adapted to receive image configuration alteration request information related to a configuration of a first image and image information of at least one second image constituting the first image from at least one terminal device; a display-side image generation section adapted to generate the first image based on the image configuration alteration request information and the image information; and a display-side display section adapted to display the first image.
Adaptive and dynamic replication management in cloud computing
A system for communicating information among a plurality of nodes of a network. The system comprises a plurality of disseminating modules installed in a plurality of nodes of a network which hosts a plurality of replicas of data having a plurality of objects, each the disseminating module has access to a dataset defining a plurality of write request dissemination topologies. Each disseminating module is defined to receive a write request from a client, to select dynamically one of the write request dissemination topologies according to at least one parameter of the client, and to disseminate the write request according to the selected write request dissemination topology.
Notifying electronic meeting participants of interesting information
Described are a system and method for notifying electronic meeting participants of information of interest. For an electronic meeting, a relationship is determined between a first participant and one or more second participants having a relationship with the first participant. A degree of interest by the second participants of a portion of the electronic meeting is determined. A notification is generated for the first participant in response to the determined degree of interest.
Multi-party multi-modality communication
Disclosed herein are example embodiments for multi-party multi-modality communication. By way of example but not limitation, a third communication device may receive first communication data for a first communication flow that is associated with a first communication device or receive second communication data for a second communication flow that is associated with a second communication device. It may further effectuate at least one conversion with respect to at least one of the first communication data or the second communication data to cause a conversion of communication data from corresponding to one type of user interaction communication modality to corresponding to another type of user interaction communication modality. A third communication device may present to a third user thereof a version of the first communication data while the second communication flow is extant or a version of the second communication data while the first communication flow is extant.
Copying document content through a hosted system
A computer-implemented method of sharing data between computer applications includes receiving, at a server system from a remote computing device, an identification of a first composite document that is arranged to encapsulate a plurality of distinct sub-documents; receiving at the server system an indication of a user intent to copy one of the sub-documents to a second composite document; identifying one or more composite documents stored on the server system to which a user associated with the remote computing device has access; receiving an indication of a user selection of a second composite document from among the one or more composite documents; and causing the indicated one of the sub-documents to be copied to the second composite document.
Cloud computing access gateway and method for providing a user terminal access to a cloud provider
A cloud computing access gateway includes a cloud management module configured to store a cloud provider and information of a cloud computing service provided by the cloud provider. A user terminal interface module is configured to provide an interface with a user terminal, receive a service request indicating a cloud computing service from the user terminal, and send a result of the cloud computing service to the user terminal. A request analysis module is configured to analyze the received service request to identify the cloud computing service. A cloud selection module is configured to select a best cloud provider based on the cloud computing service. A cloud interface module is configured to provide an interface with the cloud provider, transmit the service request to the best cloud provider, and receive the result of the cloud computing service from the best cloud provider.
Methods and apparatus to reduce memory requirements for process control system software applications
Methods and apparatus to reduce memory requirements of software applications in a process control system are disclosed. An example apparatus includes a primary process space to execute a primary application for use in a process control system, a primary user interface associated with the primary application and to be rendered on a display, and a secondary application to be invoked via the primary application. The secondary application includes a client application to enable interaction between the primary application and the secondary application, and a server application that serves the client application to implement at least one software component to generate a secondary user interface associated with the secondary application. The secondary user interface is to be communicated to the primary application to be rendered within the primary user interface.
Contextual based information aggregation system
A system automatically and continuously finds and aggregates the most relevant and current information about the people and things that a user cares about. The information gathering is based on current context (e.g., where the user is, what the user is doing, what the user is saying/typing, etc.). The result of the context based information gathering is presented ubiquitously on user interfaces of any of the various physical devices operated by the user.
Method for fully adaptive calibration of a prediction error coder
Method for fully adaptive calibration of a prediction error coder, comprising a first step of initialization; a second step of reception and accumulation of block-size data samples wherein for each received value, it is added one to the histogram bin associated to that value; a third step of analysis of the histogram and determination of the coding option; a fourth step of analysis of the histogram and determination of a coding table; a fifth step of output a header with the prediction error coder coding table determined; and wherein previous steps are repeated if more samples need to be compressed. It is useful as a data compression technique, with the advantage of being faster and more robust than the current CCSDS lossless compression standard.
System and method for handling large transactions in a storage virtualization system
The present invention provides a system and method for handling large transactions by a storage virtualization system. Current storage virtualization systems can only manage a limited number of data objects stored on an associated NAS system because of the cost or hardware constraints of physical main memory. The present invention will enable a storage virtualization system to increase the number of data objects managed by a factor of five or more by using an associated secondary memory store, such as a disk, to store information or metadata about data objects stored on associated NAS systems. The invention also provides a method for moving metadata from the storage virtualization system memory to the secondary store and back, and recovering metadata if corrupted. The invention thereby increases the number of data objects handled by the storage virtualization system with negligible loss of performance as perceived by clients of the storage virtualization system.
Rapidly deploying virtual database applications using data model analysis
Techniques are described for creating a first data abstraction model for a first database. Embodiments analyze the first database to determine a first set of structural characteristics, and analyze a second database to determine a second set of structural characteristics. The analyzed second database is associated with a second data abstraction model. The first set of structural characteristics is compared with the second set of structural characteristics to identify one or more similarities between the two sets of structural characteristics. Embodiments then create the first data abstraction model for the first database, based on the identified similarities and the second data abstraction model.
Handling hibernation of a process on a storage device
Migrating data from an old storage device to a new storage device includes creating new paths to the new storage device, freezing old paths to the old storage device, transferring metadata corresponding to the old storage device to the new storage device, where state information is transferred from the old storage device to the new storage device, and thawing the new paths. Migrating data from an old storage device to a new storage device may also include creating new volumes on the new storage device and transferring data from the old storage device to the new storage device. Migrating data from an old storage device to a new storage device may also include dismantling the old paths.
Database system with data organization providing improved bit parallel processing
A database system provides vertical or horizontal pre-packing of database data elements according to a size of physical processor words in order to obtain improved parallel processing at the bit level. After processor words are populated with data from multiple data elements of the database, query operations are used which may simultaneously process the multiple data elements in each data word simultaneously in the computer arithmetic logic unit.
Machine-implemented activity management system using asynchronously shared activity data objects and journal data items
Machine-assisted methods and apparatus are disclosed for allowing individual users to develop and organize respective activity descriptions and supporting journal items according to their respective preferences. Cross-referencing mappings may be created between activity descriptions and journal items in order to find, filter and organize disparate data. Cross-referencing mappings may also be created between the developed activity descriptions of different users so they can better understand each others perspectives and possibly overlapping goals. Different users' activity descriptions can be presented to a user even while the user may be disconnected from communication networks. Hierarchical relationships between activity descriptions may be provided. Machine-assisted means may be provided for creating work-sharing, work-delegating and/or informational sharing agreements between different users. Further machine-implemented means may be provided for automatically and asynchronously updating users on shared activities by other users even though all users are not necessarily connected to one or more respective communication networks at same time.
Method of merging and incremental construction of minimal finite state machines
A method of merging at least two state machines includes: mapping a first node from a first state machine to a second node of a second state machine to generate an input pair; performing a depth-first recursive analysis of transitions and nodes in the first state machine and the second state machine based on the input pair to construct an output node; and mapping the output node to a third state machine.
Minimization of epigenetic surprisal data of epigenetic data within a time series
A method, computer program product and system of minimizing epigenetic surprisal data either by comparing epigenetic surprisal data to a fixed baseline epigenetic data, so that all of the comparisons were made to the same baseline epigenetic data or by comparing epigenetic surprisal data to a rolling baseline of epigenetic surprisal data—that is, after each comparison the baseline is changed to the data from the time point which had been compared previously.
Advertisement generator based on external traffic
An external traffic advertisement system is provided that generates advertisement sets based on analysis of visits to a web site that were referred by an external source. The advertisement system aggregates the referral information for each referral type. A referral type may be defined by one or more of keyword text derived from the query text of the referrals, landing page type, external source, product identifier, and so on. The advertisement system may, for each referral type, aggregate the total revenue from the visits of that referral type and may generate a count of the number of converting visits for that referral type. The advertisement system then identifies those referral types whose aggregated information satisfies an advertisement criterion and generates an advertisement set for each identified referral type with a keyword derived from keyword text and with a link based on the landing page type of the referral type.
Media playback in a virtual environment
A framework is provided for selecting media files for playback in a computer game. In one embodiment, user actions in the computer game are monitored. Further, user characterizations of media files may also be retrieved. The user characterizations may be input by a plurality of users via a media player application. A media file may be then selected for playback based on the monitored user actions and retrieved user characterizations. The selected media file may better suit an emotional experience of a user playing the computer game.
Method for sharing and searching playlists
The present disclosure provides a method for making a playlist available to the public. In another embodiment, the present disclosure provides a method for creating a playlist comprising user-defined descriptor information. In another embodiment, the present disclosure provides a method for searching for such public playlists.
Roadside apparatus, control method and program
A roadside device is provided with a corresponding table where an item of a new version of a taste data table assumed user taste information from an item of an old version of the taste data table. Item numbers “52”, “53”, “62” and “63” in the old version of the taste table, for example, are made to correspond to item numbers “52”, “53” and “63” in the new version of the taste table. An ITS vehicle-mounted device sets user taste data in the updated item numbers to default values of the items in the new version for a transmitting-destination user of the taste data table of the new version and transmits the default data to an ITS vehicle-mounted device of the transmitting-destination user. Thereby, a proper default value is set for a version change of the taste data table in the roadside apparatus, reducing user's input trouble.
Method for optimizing clinical data standardization
A method of integrating clinical trial data into a form required by a standards based data format. Annotations may be made to a case report form (CRF) designed for a clinical trial that map report form data to standards compliant data. The annotations may be stored in, and then applied to data captured using that particular case report form to produce standards compliant data for that particular clinical trial. The data sets produced may then be validated as being standards compliant.
Sizing content recommendation system
In various example embodiments, systems and methods to provide sizing content recommendations are provided. An image of a user is received. The image includes a standard-sized marker. In response, sizing data for the user is determined using the image of the user that includes the standard-sized marker. Using the sizing data, a search is performed to determine items matching the sizing data. The matching items are presented to the user.
Systems and methods for secure access of data
In one embodiment the present invention includes a computer-implemented method comprising receiving a first query in a local computer system to access data stored on a remote computer system the local computer system. Data elements of the remote data are associated with data elements of the local data. The query is transformed into multiple queries. A second query is sent to the remote computer system to retrieve remote data. A first data result is received and stored on the local computer system and incorporated into a third query. The third query is executed against the local data and the first data result to produce a result. Sensitive data may be stored locally in a dimension table of a star schema and non-sensitive data may be stored remotely in a fact table and another dimension table of the star schema, for example.
Modifying ranking data based on document changes
Methods, systems, and apparatus, including computer programs encoded on computer storage media for determining a weighted overall quality of result statistic for a document. One method includes receiving quality of result data for a query and a plurality of versions of a document, determining a weighted overall quality of result statistic for the document with respect to the query including weighting each version specific quality of result statistic and combining the weighted version-specific quality of result statistics, wherein each quality of result statistic is weighted by a weight determined from at least a difference between content of a reference version of the document and content of the version of the document corresponding to the version specific quality of result statistic, and storing the weighted overall quality of result statistic and data associating the query and the document with the weighted overall quality of result statistic.
Displaying ranked categories of data in a Venn diagram
A solution that displays ranked categories of data in a Venn diagram is provided. In particular, entries of data are assigned to one of a plurality of categories based on one or more attributes of the entries. The categories are then ranked for each of one or more criteria. Each criterion can use a unique set of the attributes to rank the categories. A Venn diagram is generated that includes a circle for each criterion and displays the rankings of the various categories using one or more visual representations of each category. For example, the rankings can be displayed using tag clouds for each category that are placed in each circle. Two or more circles can overlap in which case categories that have one or more entries that meet all the corresponding criteria can be displayed in the overlapping portion of the circles.
Enumeration of trees from finite number of nodes
Embodiments of methods, apparatuses, devices and/or systems for manipulating hierarchical sets of data are disclosed.
Matching device and computer-readable storage medium
A matching device builds a parse tree from an event pattern. The matching device builds an automaton by, while traversing the parse tree, joining child nodes of an AND node in parallel to the AND node and joining child nodes of an OR node in parallel to the OR node. The matching device performs matching of determining whether an event stream includes the event pattern by comparing the event stream with the automaton.
Systems and methods for high-speed searching and filtering of large datasets
A binary data file embodies an inline tree data structure storing fields of a hierarchical dataset. The inline tree comprises first-level binary string segments, each comprising substantially contiguous second-level binary string segments, corresponding to subranges of first and second subsets of data fields. Size is reduced by substituting: binary string indices for alphanumeric strings; a data clump index for a set of correlated/anticorrelated strings; field masks for unoccupied data fields. A dedicated conversion program generates the inline tree from conventional database formats, which is read entirely into RAM to be searched/filtered by a dedicated search/filter program. Small size (<2 bytes/field/record) and contiguous arrangement enables searching/filtering of >106 records (>100 data fields) in <500 nanoseconds/record/core. Recursive subdivision of selection field ranges can guide searches that include those selection fields. One example includes geographic searching/filtering of records that include latitude and longitude fields.
Tag valuation within a collaborative tagging system
A method of assessing the value of tags in a collaborative tagging system can include monitoring user interaction with each of a plurality of tags and/or artifacts associated with tags, wherein each of the plurality of tags has been previously associated with at least one artifact of the collaborative tagging system. For each of the plurality of tags, a measure of value for the tag can be determined according to user interaction with the tag. A list comprising at least one tag and an indication of the measure of value of the tag can be output.
Generation of service specification of a service oriented architecture (SOA) solution
A system and associated method for automatically generating a service specification of a Service Oriented Architecture (SOA) solution. A process model framework and a data model framework are received as inputs. Processes in the process model framework perform services of various complexity levels. Processes are decomposed into a respective set of atomic service processes in the lowest complexity level and data objects are extracted from the decomposed atomic service processes. The data objects are associated with data elements of the data model framework. The data model framework is extended and flexibility patterns are added for reusability of the service specification. The service specification of the SOA solution is generated as process interfaces represented with the data objects according to inputs from a user customizing aspects of the service specification, for either a desired service of the SOA solution or a desired process in the process model framework.
Mining semi-structured social media
Methods and apparatus for analysis of semi-structured social media are described. A method comprises classifying a plurality of user-generated content entries into a plurality of categories based at least in part on an analysis of respective structured components of at least a subset of the plurality of entries. The method further includes determining, based at least in part on an analysis of additional components of entries of a particular category, a set of representative content elements of entries of the particular category, and generating a report that comprises one or more representative content elements of the particular category.
Method and system for grouping multimedia files from plural vendors' servers in media store's catalog
A media store server provides customers' digital information devices with a catalog of multimedia content available from servers of multiple vendors. To provide a unified catalog for the store, the multimedia contents are grouped according to descriptive texts. A descriptive text for a multimedia content item or file is obtained from a vendor's catalog, and the descriptive text is standardized to generate a token for that particular multimedia content item. The multimedia content is classified in an existing catalog group corresponding to an already existent token, if the generated token matches an existent token in the catalog of the media store server. A new group for multimedia content is generated and the particular multimedia content is assigned to the new group, if the generated token does not yet exist in the catalog of the multimedia store server.
Identifying an auto-complete communication pattern
A method for identifying an auto-complete communication pattern within a sequence of request entities includes grouping the request entities into a plurality of clusters according to a criterion. Clusters are removed from the plurality according to at least one of pattern analysis, a cluster size, and a cluster timing. Remaining clusters are identified as having an auto-complete communication pattern.
Ending tuple processing in a stream-based computing application
A method includes receiving streaming data to be processed by a plurality of processing elements comprising one or more stream operators. Time metadata may be added to a parent tuple at a first stream operator. A first time metric may be determined for a first child tuple of the parent tuple at a second stream operator. The first time metric may be determined, at least in part, from the time metadata. The second stream operator may receive the first child tuple from the first stream operator. The method may include transmitting a second child tuple of the parent tuple from the second stream operator to a third stream operator if the time metric is inside a time limit. In addition, the method may include ending processing of the first child tuple if the time metric is outside of the time limit.
Generating method, generating system, and recording medium
A computer-readable recording medium stores a program for causing an apparatus to execute a procedure. The procedure includes: regarding each data in a data set having a key and a value corresponding to the key, calculating a key characteristic value of the data as an index value indicating an existence of the key in the data and another key included in the value based on the value of the key and the value of the other key included in the value; generating a segment in which data blocks of which the calculated key characteristic values are similar to each other are grouped in one group; and setting a storage destination of the data in the generated segment.
System and method for extraction of off-topic part from conversation
A system and method extract off-topic parts from a conversation. The system includes a first corpus including documents of a plurality of fields; a second corpus including only documents of a field to which the conversation belongs; a determination means for determination as a lower limit subject word a word for which IDF value for the first corpus and IDF value for the second corpus are each below a first certain threshold value; a score calculation part for calculation as a score a TF-IDF value for each word included in the second corpus; a clipping part, for sequential cutting out of intervals from text data that are contents of the conversation; and an extraction part for extraction as an off-topic part an interval where average value of the score of words included in the clipped interval is larger than a second certain threshold value.
System and method for computerized batching of huge populations of electronic documents
A method for computerized batching of huge populations of electronic documents, including computerized assignment of electronic documents into at least one sequence of electronic document batches such that each document is assigned to a batch in the sequence of batches and such that there is no conflict between batching requirements, the following batching requirements being maintained by a suitably programmed processor: a. pre-defined subsets of documents are always kept together in the same batch, b. batches are equal in size, c. the population is partitioned into clusters, and all documents in any given batch belong to a single cluster rather than to two or more clusters.
Query response using media consumption history
Methods, systems, and apparatus for receiving a natural language query of a user, and environmental data, identifying a media item based on the environmental data, determining an entity type based on the natural language query, selecting an entity associated with the media item that matches the entity type, selecting, from a media consumption database that identifies media items that have been indicated as consumed by the user, one or more media items that have been indicated as consumed by the user and that are associated with the selected entity, and providing a response to the query based on selecting the one or more media items that have been indicated as consumed by the user and that are associated with the selected entity.
Identifying web pages of the world wide web relevant to a first file using search terms that reproduce its citations
Methods and systems for providing related web pages are disclosed. One method includes identifying a plurality of web pages, wherein the plurality of web pages each have a relationship with the first file, wherein the world wide web provides a platform for sharing web pages, and wherein each web page includes a document or information resource that is suitable for the world wide web and is accessible through a web browser. The method further includes generating a list of inquiries based on the plurality of web pages, providing, the list of inquiries to at least one author of the first file, receiving from the at least one author at least one response to the list of inquiries, selecting a subset of the plurality of web pages based on the at least one response, and storing information related to the selected subset of the plurality of web pages.
Prioritizing synchronization of audio files to an in-vehicle computing device
Technology is disclosed for synchronizing audio files from a computing device of a user to an in-vehicle computing device, such as an audio system, installed in an automobile. In one example, when the user plays an audio file on the in-vehicle computing device from the computing device, the audio file is copied at the in-vehicle computing device. After copying the currently playing audio file, the in-vehicle computing device can also copy at least some of the audio files from the computing device. The in-vehicle computing device computes a popularity score of each of the audio files based on an access pattern of the audio files, and categorizes them into priority files and low-priority files based on their popularity score. While the in-vehicle computing device copies the priority files, it copies metafiles of the low-priority files. The metafiles can include information such as a title, artist, etc. of the audio files.
Predictive content delivery
A system and method for predictive retrieval of content is described. Prior to selection and delivery of content to a mobile device by a personal computer, content is predictively retrieved from storage at the computing device. By predictively retrieving content, the content is available for immediate computing device to mobile device transfer.
Forum search with time-dependent activity weighting
A search engine index measures and tracks one or more numeric indicators of activity at different times, including a most current time, in on-line forums and social networking sites. Such indicators may include, for example, a current volume per unit time of messages or data posted to the site, a moving average of such volume, a moving average of current participants over time, a count of current participants, other indication of site activity, or any combination of such indicators. The search engine is responsive to queries seeking forums ranked by activity for a defined time period, including a most current time. The search engine prioritizes search results to identify the specified sites or locations in order of activity (among other possible criteria) relative to a defined time.
Interleaving search results
Methods, systems, and computer program products are provided for interleaving search results. A method includes presenting multiple first search results received from a first search engine. The first search results satisfy a search query directed to the first search engine and are presented in an order. A second search result from a second search engine is inserted at a position between two otherwise adjacent first search results. The second search result is received from a second search engine in response to the search query.
Generating enumerated information in which a plurality of files are enumerated in a sequential medium
A mechanism is provided for generating enumerated information in which a plurality of files is enumerated except entirely-invalidated files on a sequential medium. Management information for managing locations where the plurality of files on the sequential medium are recorded is acquired from the sequential medium. The enumerated information in which the plurality of files are enumerated is generated in an order according to the locations where the plurality of files are recorded on the basis of the acquired management information.
Compression of data transmitted over a network
A system, method, and apparatus are directed towards identifying adaptive length segments of redundant data for encoding a data structure. Initial boundaries are identified for an input matching segment within input data and for a candidate store matching segment in a synchronized store. The data prior to and after the boundaries are compared to identify matching data. As matching data is identified, at least one of the boundaries of the matching segments is revised. An encoded representation of the resulting input matching segment is then generated based in part on pointers and offsets into the synchronized store. A data structure is generated based on the encoded representation and unmatched portion, which is sent to a receiver. The receiver uses the data structure to extract matching data from the synchronized store, and together with the unmatched input data in the data structure, reconstruct the input data.
Automatically generating a customer notification file status report
A customer communication system of a mobile communication network automatically generates a report concerning the location of a customer notification file within the customer communication system to allow for easier file review in response to an error message. In the examples, a file information database is accessed to obtain information regarding the expected file name or expected location of the customer notification file. Using the file information, a search is conducted for the location of the customer notification file. Error correction information is also collected regarding the customer notification file. The system then generates a report combining the information regarding the location of the customer notification file with the reference information regarding any error correction instructions. The report is published, thereby allowing any user responsible for the correction of an error message to access the file location information and the associated error correction instructions.
Role-based security policy for an object-oriented database system
A system for adding security data to a search index comprises a processor and a memory. The processor is configured to select an object in a search index, wherein an entry associated with the object is stored in the search index and add security entity data to an entry of the search index corresponding to the selected object. A memory is coupled to the processor and is configured to provide the processor with instructions.
Systems and methods for remedying corrupt backup images of host devices
A computer-implemented method for remedying corrupt backup images of host devices may include (1) identifying a backup image that represents a computing state of a host device at a specific point in time, (2) performing a data-corruption analysis on the backup image that represents the computing state of the host device to determine whether the backup image is corrupt, (3) determining that at least a portion of the backup image is corrupt based at least in part on the data-corruption analysis, and then (4) performing at least one remedial action to initiate remedying the corrupt portion of the backup image in response to determining that the portion of the backup image is corrupt. Various other methods, systems, and computer-readable media are also disclosed.
Reclaiming space from a file system
Technologies are provided for reclaiming a file system coupled to a block device. In these technologies, a dummy file is created. The dummy file is expanded to fill a volume in the block device. A mapping of the dummy file to locations in the volume is retrieved. When the mapping of the dummy file to the locations in the volume is retrieved, corresponding space in the volume is reclaimed. This space may include the locations in the volume corresponding to the mapping of the dummy file. When this space in the volume is reclaimed, the dummy file is deleted.
A write request is received at a database server from a client application for writing data to persistent data storage. In response to receiving the write request, the database server selects a set of multiple replication servers. The data is sent from the database server to the selected set of multiple replication servers for writing to the persistent data storage. Confirmation is received at the database server from replication servers in the selected set of multiple replication servers. In response to receiving confirmation from the replication servers in the selected set of multiple replication servers, the database server sends to the client application information indicating success of the write request.
Logging modifications to a variable in persistent memory
A log entry is created in persistent memory that represents a modification to a variable that resides in persistent memory. A log entry is created in persistent memory that represents a synchronization operation. A program-order based dynamic ordering relationship is created between two successive log entries within an execution entity. A synchronization-order based dynamic ordering relationship is created between two log entries corresponding to synchronization operations in concurrently executing distinct execution entities of said execution instance.
Hosted storage locking
A hosted storage system receives a request from a requester to access a hosted resource. The hosted resource includes a binary large object. The hosted storage system providing hosted storage to a plurality of clients that are coupled to the hosted storage system. A copy of the hosted resource is created. A copy message including the copy of the hosted resource is provided to the requester. The hosted resource is maintained in the hosted storage system while the requester modifies the copy of the hosted resource. A message is received from the requester. The messages include a modified copy of the hosted resource. It is determined that the hosted resource has not been modified since the copy of the hosted resource was created. The hosted resource is replaced with the modified copy of the hosted resource.
System for configurable reporting of network data and related method
Method and apparatus for transferring files between hosts including reading a first configuration file to obtain file retrieval criteria, logging into a retrieval host to retrieve a file based on the file retrieval criteria, saving retrieved file to a local host, reading a second configuration file to obtain file push criteria, including instructions for where to push the retrieved file, pushing the retrieved file to a push host based on the file push criteria, pushing an enabled hosts file from the local host to the push host, the enabled host file containing configuration criteria and sending a notification to the retrieval host if a file meeting the configuration criteria has not been retrieved from the retrieval host to the local host, or sending a notification from the local host to the push host if a file meeting the configuration criteria has not been pushed to the push host.
Method and apparatus for tracking device management data changes
A method and apparatus for tracking device management data changes comprising storing information related to modification to device management data wherein the device management data is stored in an Open Mobile Alliance (OMA) compliant device management tree of Managed Objects (MO).
Hyper-lattice model for optimized sequencing of online analytical processing (OLAP) operations on data warehouses
Systems and methods are provided for Online Analytical Processing of data included within data warehouses. According to one example, a method for adding a dimension to a hyper-lattice structure is provided and includes adding a new base cuboid to a hyper-lattice that describes functionality of the data warehouses. According to another example, a method for determining an optimal path through an existing hyper-lattice by which to generate a destination cuboid from a source cuboid is also provided.
Annotating environmental data represented by characteristic functions
According to certain embodiments, a set of samples of sensor data is accessed. The set of samples records environmental measurements taken by one or more environmental sensors. A characteristic function is generated from the set of samples. The characteristic function indicates whether a given sample is a member of the set of samples. One or more samples of the set of samples that are associated with a given environmental annotation are identified according to the characteristic function.
Information processing apparatus, information processing method, and computer program
To provide an apparatus and method for efficiently displaying image content, which is sent and received between a server and a client, in a correct direction. An image content providing server stores, as property information, original angle information indicating correct directions of image content as metadata of the image content. The server generates content information including the original angle information and sends the generated content information to a client. This allows the client to understand the correct direction of the image content received from the server, and to obtain and display image data in the correct direction by performing rotation processing in the client device based on the obtained information or to request the server to perform the rotation processing.
Decision-support application and system for problem solving using a question-answering system
A decision-support system for problem solving comprises software modules embodied on a computer readable medium, and the software modules comprise an input/output module and a question-answering module. The method receives problem case information using the input/output module, generates a query based on the problem case information, and generates a plurality of answers for the query using the question-answering module. The method also calculates numerical values for multiple evidence dimensions from evidence sources for each of the answers using the question-answering module and calculates a corresponding confidence value for each of the answers based on the numerical value of each evidence dimension using the question-answering module. Further, the method outputs the answers, the corresponding confidence values, and the numerical values of each evidence dimension for one or more selected answers using the input/output module.
System and method for determining a value of information metric from a posterior distribution generated through stochastic inversion
A system and a computer implemented method for determining a value of information are described herein. The method includes drawing a plurality of synthetic prior earth models from one or more prior distributions for a plurality of well locations and generate from each prior distribution synthetic data; and drawing a plurality of posterior earth models from a posterior distribution for the plurality of well locations, the posterior distribution being generated through stochastic inversion from the synthetic data and the plurality of posterior models are drawn from each of the plurality of prior earth models. The method further includes calculating a difference or a ratio between a weighted value prior and a weighted value posterior and calculating a sum over a plurality of well locations of the difference or the ratio to obtain the value of information.
Stable parallel loop systems
Stable Parallel Loop (SPL) systems and exemplary embodiments are described with reference to both software and hardware platforms. A SPL network includes an input surface, internal nodes, connections that selectively link internal nodes, and an output surface. Signals from the environment are received on the input surface. The received signals excite internal nodes of the SPL network. The internal nodes exhibit their own dynamic behavior. As a result of the interconnected network structure and operational characteristics of each node, dynamic loops are formed among certain internal nodes. A dynamic loop is formed when all of internal nodes within an interconnected loop are active. Output from the SPL network is generated based on the dynamic loops that are formed. Tools to develop and implement a SPL network are presented.
Systems, methods, and software for hyperlinking names
Hyperlinking or associating documents to other documents based on the names of people in the documents has become more desirable. Although there is an automated system for installing such hyperlinks into judicial opinions, the system is not generally applicable to other types of names and documents, nor well suited to determine hyperlinks for names that might refer to two or more similarly named persons. Accordingly, the inventor devised systems, methods, and software that facilitate hyperlinking names in documents, regardless of type. One exemplary system includes a descriptor module and a linking module. The descriptor module develops descriptive patterns for selecting co-occurent document information that is useful in recognizing associations between names and professional classes. The linking module tags names in an input document, extracts co-occurent information using the descriptive patterns, and uses a Bayesian inference network that processes a (non-inverse-document-frequency) name-rarity score for each name along with the name and selected co-occurent document information to determine appropriate hyperlinks to other documents, such as entries in professional directories.
Work-item notification classifier
Embodiments of the present invention provide a system, method, and program product for predicting the classification of a work-item notification generated by an issue tracking system. A computing device analyzes a new work-item notification using a trained binary classifier that was trained using at least a past and/or current work-item history that was collected as a tuple that includes information reflecting the workitem-ID, actor, timestamp, attribute, work-item start-value, and work-item end-value. The computing device, in response to analyzing the new work-item notification, predicts a classification of the new work-item notification. In an embodiment, the classification is used for display of the new work-item notification.
System and method for adaptive recall
Described is a system for adaptive memory recall. The system receives original input data, then divides the original input data into multiple data groups to serve as input for a network comprising a pattern separation layer and an autoassociative memory layer. The original input data is processed with a pattern separation component of the pattern separation layer, and each pattern separation component generates an increased-contrast version of the original input data it processes. The generated increased-contrast version of the original input data is combined with the original input data and stored in an autoassociative memory component of the autoassociative memory layer for each data group. New input data is received, and a parameter that controls processing in the pattern separation layer is modulated to determine an optimal parameter, which indicates that a memory recall between the stored data and the new set of input data is achieved.
Parameter setting apparatus, non-transitory medium storing computer program, and parameter setting method
A parameter setting apparatus for a control parameter for a wireless communication network including a processor, wherein optimizations for optimizing the control parameter are separated into groups which are unrelated to each other, and the processor executes: a first agent program which are assigned to a group-by-group selects an optimization to be activated according to a first value function; and a second agent program which learns a second value function for determining whether an optimization that affects the first value function is to be activated or not and determines whether the optimization is to be activated or not according to the second value function, and, the activation of the optimization by the first agent program is stopped when the second agent program activates the optimization.
Campaign in a geo-spatial environment
A method, apparatus, and system of a campaign in a geo-spatial environment is disclosed. In one embodiment, a method includes populating each profile of a geo-spatial social network with an address data, forming a group in support of a campaign in the geo-spatial network when a particular user creates the group in support of the campaign and automatically communicating media to a physical location of a member of the group based on the address data associated with each profile of the geo-spatial network. The method may also include automatically creating the group based on a public data associated with each profile of the geo-spatial social network even prior to certain users associated with each profile registering geo-spatial social network by applying the public data to the each profile.
Apparatus and method for authorization of online financial transaction
A method and an apparatus for authorizing online financial transactions are provided. The apparatus for authorizing online financial transactions includes: randomly selecting, using an apparatus for authorizing online financial transactions, a portion of main transaction information corresponding to a user and combining the selected information to create authorization information; converting the authorization information into a form displayed to the user through a specific process; providing the main transaction information and the converted authorization information to the user; receiving user select information, which is recognized by the user and is part of the main transaction information, and the converted authorization information provided to the user; and comparing the user select information with the authorization information and determining whether the user recognizes the authorization information based on the comparison results.
Methods and systems for virtual checking are described. A virtual check is created by a payor's device and then sent to the payee's device. The payee can be another mobile device. The virtual check has many of the same features as a regular, paper check plus additional features only available in digital form. In an example, the data can be encrypted by either the banks key or the payor's key. Further encryption can occur between the payor's device and the payee's device, which can connect on a peer-to-peer network. The check can be an image with tag data. In an example, data can be encoded into the image itself. The virtual check can include populated data that cannot be changed by the payee. In an example, the virtual check application of the payee can automatically perform a funds availability check.
Method for securing IP connections for network operator combinatory connections
The invention relates to a method for securing IP connections with a combinatory connection of a communication network of a first network operator with a communication network of at least one second network operator using the Session Initiation Protocol, SIP. This method is based on the fact that portions of an SIP message, but at least the information necessary for the combinatory connection of the networks, is transmitted in encrypted form between a transmission channel of the first network operator and a reception channel of the second network operator.
Geographic internet asset filtering for internet video client
A device is enabled to display Internet TV by accessing a management server with a secret unique ID and receiving back from the server, assuming the ID is approved, a user token and a service list of content servers with knowledge of the user token. A user can select a content server which causes the device to upload its user token and in response receive a content list from the content server, from which content can be selected for display. Neither list may be modified by the device and the device can access only content on a content list. The service list may be tailored for the geographic location of the device.
Methods, systems and computer program products for determining usage rights for digital content based on characterizing information thereof and related devices
A method for controlling unauthorized use of digital content includes identifying digital content for validation. Characterizing information is generated that designates the identified digital content, and usage rights for the identified digital content are determined based on the characterizing information, for example, based on a comparison of the characterizing information that designates the identified digital content to a plurality of characterizing information. Usage of the identified digital content may also be controlled based on the determined usage rights. Related systems, methods, devices, and computer program products are discussed.
Method, system and server for managing data transmission
Method, system and server for managing data transmission. The method comprises the following steps: the first client requests the server for data update; the server analyzes the request of the first client and takes the control measurement to the data that the client requests to update according to the predetermined control policy, and performs the subsequent process after the data requested by the client meet the control policy; the server informs the first client to update the data; the first client updates the data; the server informs the second client that the data of the first client has been updated; the second client acquires the updated data. The present invention discloses also a control system and a control equipment achieving the above method. The server takes the unified central control notification mode according to the present invention to effectively control the propagation approach of the personalized data.
Computer implemented method for a recycling company to increase recycling demand
Proposed is a computer-implemented method for a recycling company to increase recycling demand, the computer including a processor system having at least one processor and a memory system. The method comprises registering, by the computer, a recycler with a recycling company, wherein the recycler obtains identification. The computer then enters the recycler's identification to begin a transaction for recycling. The type of material to be recycled is entered into the computer. The processor system evaluates a value for the recyclable material and determines the total payment to be paid to the recycler. A portion that is less than or equal to the total payment given to a fund is entered into the computer, and the final payment to be paid to the recycler is computed. The final payment is the total payment less the portion given to the fund. On completion of the above operations, the transaction is logged.
Systems and methods for determining a quantitative retail sentiment index from client behavior
Systems, methods, and instructions stored on computer-readable mediums for calculating a volatility score for each of a plurality of securities and calculating a reference volatility score for a benchmark. A relative volatility score is derived for each of the plurality of securities based upon the volatility score for each of the plurality of securities and the reference volatility score. A correlation for each of the plurality of securities to the benchmark is determined. The relative volatility score for at least one of the securities is adjusted based on the correlation. An aggregated volatility score is derived for each of a plurality of accounts based in part on securities held within an account and the relative volatility scores for the securities. A sentiment index is determined based upon the aggregated volatility score for each of the plurality of accounts.
Gift card mall in the home
Systems and methods for distributing and activating gift cards and advertising so as to provide a gift card mall in the home of a gift giver are described. The system can include a unitary single-sheet form, a package envelope, an activation system, a delivery system, and a redemption system. The system can also include a publication. A plurality of the forms can be inserted into the package envelope for delivery to the gift giver. The gift giver can select one or more of the gift cards for activation and delivery to a gift recipient. The gift recipient can then redeem the activated gift received from the gift giver for a redemption item sold or provided by a retailer, service provider, or manufacturer. The redemption item can be a good, service, or money. The redemption item can be purchased at an online shopping mall, by telephone, or in a retail store.
System and method for supporting mobile unit connectivity for computer server to process specific orders
The present invention is an applications gateway that offers multiple functions and features for specific geographic venue locations, while providing easy access to advertising, purchasing, and redemption opportunities for that specific geographic venue location. Venue locations can be stadiums, shopping malls, amusement parks, open air spaces where people can congregate, and/or buildings, which most often require the presence of a concentration of people. The venue location may correlate to the location of the hand-held mobile unit or it may be a remote geographic venue location not near the location of the hand-held mobile unit. Access to the gateway application is through a hand-held mobile unit, which can include a mobile phone, smartphone device, or portable computer having a wireless radio transmission connection. (e.g. iPhone, Droid, iPad, Slate, etc.).
Keeping popular advertisements active
A computerized method and system for keeping popular advertisements active are provided. Example embodiments may include identifying one or more expiring online content from a plurality of online contents. A popularity of the one or more expiring online content may be determined; and an expiration date of the one or more expiring online content may be extended based on the popularity.
System and method for individual sequential campaign
Exemplary embodiments of the invention include the use of a guaranteed cognitive awareness coupled with an individualized sequential advertising campaign directed at a specific user. A user may be offered services such as: telecommunication services, video services, radio or other audio services (traditional radio or satellite radio services), television services (traditional cable or satellite television services), software services, electronic book services, etc. In return for the use of such services free of charge, the services may be periodically interrupted and a commercial message may be conveyed to the user. The commercial message may prompt the user to input a specific value, selection, or keystroke, or may require a response through voice input or selection with a device. Should the user provide the response, the provision of services may continue. Moreover, the commercial messages provided to the user may presented as an individual sequential advertising campaign.
Identifier-based coupon distribution
A client device detects a QR code (or NFC tag). The client device decodes the QR code. The client device determines that the data encoded within the QR code includes a URL. Based on the URL, the client device sends a first request to a first server identified by the URL. In response to the first request, the client device receives from the first server data configured to cause the client device to display, to a user of the client device, at least one of: a video or an interactive web page. Responsive to the data encoded in the QR code, the client device sends to a coupon server: identification data associated with a user of the client device, and a request for the coupon server to distribute a digital coupon for an offer associated with an identifier encoded within the QR code to an account associated with the user.
System and method for targeting information based on message content
A method of serving an electronic document in response to a client request includes identifying an electronic document requested by a client. At least one information entity matching at least one predetermined information entity type is extracted from the electronic document. One or more links are then generated for each extracted information entity and are served to the requesting client in connection with other information corresponding to the at least one information entity and the electronic document. In some embodiments the electronic document is an email message, SMS message, transcribed voice message, or a combination of such messages. In some embodiments the extracted information entity is a physical address, an email address, a phone number, an object identification number, a product name, a company name, a stock symbol, a movie title, a book title, a calendar entry, an individual's name, a city name, a URL, or event information.
Incentive provision system
An incentive provision system that contributes to expanded sales of a content service and includes a user terminal and a provision device. The provision device receives, from the user terminal, request information for requesting incentive information relating to the content service. If the request information is valid, then the provision device provides the incentive information to the user terminal. A user of the user terminal enjoys using the incentive information provided from the provision device, which, in turn, motivates the user to receive the content service.
Lifecycle obsolescence forecasting tool
A lifecycle obsolescence forecasting system. The system may include a data integrator configured to receive part information for a plurality of parts. The system may include a sustainability optimizer configured to receive one or more sustainability requirements for a part in the plurality of parts. The system may include a forecaster coupled to the data integrator and the sustainability optimizer, wherein the forecaster may be configured to analyze the part information and the one or more sustainability requirements to establish a component stock-out date for the part, wherein the component stock-out date may comprise a date when a last spare of the part is forecast to be removed from stock, and wherein the component stock-out date may be established as a function of at least the part usage rate and a corresponding failure rate of the part.
Online method for training vehicle drivers and determining hazard detection proficiency
A method for training vehicle drivers to detect hazards, the method having step that include: visually presenting to a driver a continuous drive through a driving environment comprised of at least two hazard modules, wherein each hazard module presents at least one driving scenario that comprises at least one hazard; recording where within the visual presentation the driver looks to detect hazards during the visual presentation of the continuous drive; and determining the driver's hazard detection proficiency by evaluating whether the driver looked at hazards during the visual presentation of the continuous drive.
Device and method for building claim assessment
Disclosed systems and methods automatically assess claims. A device may receive one or more images of a claimed object, such as a building or vehicle, compare the images to reference images and generate an estimate of financial damages to the object. The device may then generate a claim assessment based on previous comparisons and generated estimates. The claim assessment may be sent directly to a client or to an agent for review and/or processing.
Method for describing the composition of audio signals
Method for describing the composition of audio signals, which are encoded as separate audio objects. The arrangement and the processing of the audio objects in a sound scene is described by nodes arranged hierarchically in a scene description. A node specified only for spatialization on a 2D screen using a 2D vector describes a 3D position of an audio object using said 2D vector and a 1D value describing the depth of said audio object. In a further embodiment a mapping of the coordinates is performed, which enables the movement of a graphical object in the screen plane to be mapped to a movement of an audio object in the depth perpendicular to said screen plane.
Method for controlling electronic apparatus based on voice recognition and motion recognition, and electronic apparatus applying the same
A method for controlling an electronic apparatus which uses voice recognition and motion recognition, and an electronic apparatus applying the same are provided. In a voice task mode, in which voice tasks are performed according to recognized voice commands, the electronic apparatus displays voice assistance information to assist in performing the voice tasks. In a motion task mode, in which motion tasks are performed according to recognized motion gestures, the electronic apparatus displays motion assistance information to aid in performing the motion tasks.
System and method for speech personalization by need
Disclosed herein are systems, computer-implemented methods, and tangible computer-readable storage media for speaker recognition personalization. The method recognizes speech received from a speaker interacting with a speech interface using a set of allocated resources, the set of allocated resources including bandwidth, processor time, memory, and storage. The method records metrics associated with the recognized speech, and after recording the metrics, modifies at least one of the allocated resources in the set of allocated resources commensurate with the recorded metrics. The method recognizes additional speech from the speaker using the modified set of allocated resources. Metrics can include a speech recognition confidence score, processing speed, dialog behavior, requests for repeats, negative responses to confirmations, and task completions. The method can further store a speaker personalization profile having information for the modified set of allocated resources and recognize speech associated with the speaker based on the speaker personalization profile.
Voice-interactive marketplace providing promotion and promotion tracking, loyalty reward and redemption, and other features
The invention provides a system, method, and business model for an information system and service having business self-promotion, promotion and promotion tracking, loyalty or frequent participant rewards and redemption, audio coupon, ratings, and other features. A business or organization in which consumers call into a service using ordinary telephone, PC, PDA, or other information appliance, and make requests in plain speech for information on goods and/or services, and the service provides responses to the request in plain speech in real-time. Provides operating model for a telephone-based audio-interfaced goods and services information and referral service having merchant self-promotion features, including database provider storing merchant information; an interface for inputting merchant information into the database and for retrieving and editing the information; and an interface for inputting voice commands and data and for receiving merchant information and processed information from the database in response to the input voice commands and data.
Speech synthesis apparatus and method
According to an embodiment, a speech synthesis apparatus includes a selecting unit configured to select speaker's parameters one by one for respective speakers and obtain a plurality of speakers' parameters, the speaker's parameters being prepared for respective pitch waveforms corresponding to speaker's speech sounds, the speaker's parameters including formant frequencies, formant phases, formant powers, and window functions concerning respective formants that are contained in the respective pitch waveforms. The apparatus includes a mapping unit configured to make formants correspond to each other between the plurality of speakers' parameters using a cost function based on the formant frequencies and the formant powers. The apparatus includes a generating unit configured to generate an interpolated speaker's parameter by interpolating, at desired interpolation ratios, the formant frequencies, formant phases, formant powers, and window functions of formants which are made to correspond to each other.
System and method for applying dynamic contextual grammars and language models to improve automatic speech recognition accuracy
The invention involves the loading and unloading of dynamic section grammars and language models in a speech recognition system. The values of the sections of the structured document are either determined in advance from a collection of documents of the same domain, document type, and speaker; or collected incrementally from documents of the same domain, document type, and speaker; or added incrementally to an already existing set of values. Speech recognition in the context of the given field is constrained to the contents of these dynamic values. If speech recognition fails or produces a poor match within this grammar or section language model, speech recognition against a larger, more general vocabulary that is not constrained to the given section is performed.
Determining the position of the source of an utterance
An information processing apparatus includes: a plurality of information input units; an event detection unit that generates event information including estimated position information and estimated identification information of users present in the real space based on analysis of the information from the information input unit; and an information integration processing unit that inputs the event information, and generates target information including a position of each user and user identification information based on the input event information, and signal information representing a probability value of the event generation source, wherein the information integration processing unit includes an utterance source probability calculation unit, and wherein the utterance source probability calculation unit performs a process of calculating an utterance source score as an index value representing an utterance source probability of each target by multiplying weights based on utterance situations by a plurality of different information items from the event detection unit.
Interactive device that recognizes input voice of a user and contents of an utterance of the user, and performs a response corresponding to the recognized contents
The present invention provides an interactive device which allows quick utterance recognition results and sequential output thereof and which diminishes a recognition rate decrease even if user's utterance is divided by a short interval into frames for quick decision. The interactive device: sets a recognition section for voice recognition; performs voice recognition for the recognition section; when the voice recognition includes a key phrase, determines response actions corresponding thereto; and executes the response actions. The interactive device repeatedly updates the set recognition terminal point to a frame which is the predetermined time length ahead of the set recognition terminal point to set a plurality of recognition sections. The interactive device performs voice recognition for each recognition section.
Speaker state detecting apparatus and speaker state detecting method
A speaker state detecting apparatus comprises: an audio input unit for acquiring, at least, a first voice emanated by a first speaker and a second voice emanated by a second speaker; a speech interval detecting unit for detecting an overlap period between a first speech period of the first speaker included in the first voice and a second speech period of the second speaker included in the second voice, which starts before the first speech period, or an interval between the first speech period and the second speech period; a state information extracting unit for extracting state information representing a state of the first speaker from the first speech period; and a state detecting unit for detecting the state of the first speaker in the first speech period based on the overlap period or the interval and the first state information.
Community audio narration generation
The community-based generation of audio narrations for a text-based work leverages collaboration of a community of people to provide human-voiced audio readings. During the community-based generation, a collection of audio recordings for the text-based work may be collected from multiple human readers in a community. An audio recording for each section in the text-based work may be selected from the collection of audio recordings. The selected audio recordings may be then combined to produce an audio reading of at least a portion of the text-based work.
Systems and methods for advanced grammar checking
In embodiments of the present invention improved capabilities are described for methods and systems of grammar checking comprising a grammar checking facility and a plurality of human proofreaders in a crowd-source population for the detection and correction of grammatical errors in text as received from a computing device with input restrictions including reduced size keyboard and display.
Speech translation apparatus, method and program
According to one embodiment, a speech translation apparatus includes a speech recognition unit, a translation unit, a search unit and a selection unit. The speech recognition unit successively performs speech recognition to obtain a first language word string. The translation unit translates the first language word string into a second language word string. The search unit search for at least one similar example and acquires the similar example and a translation example. The selection unit selects, in accordance with a user instruction, at least one of the first language word string associated with the similar example and the second language word string associated with the translation example, as a selected word string.
Machine translation device, method of processing data, and program
Provided are two types of translation engines. One of the translation engines translates a text written in a source language X into an intermediate language C, and the other translates the intermediate language C into a target language Y. The X-C translation engine translates an original text written in the source language X into a text in a predetermined intermediate language C as well as acquires and adds annotations obtained by this translation to the translated text written in the intermediate language C. The C-Y translation engine references annotations, which are obtained by the X-C translation engine and added to the text in the intermediate language C, and translates the text in the intermediate language into a text in the target language Y sentence.
Wire like link for cycle reproducible and cycle accurate hardware accelerator
First and second field programmable gate arrays are provided which implement first and second blocks of a circuit design to be simulated. The field programmable gate arrays are operated at a first clock frequency and a wire like link is provided to send a plurality of signals between them. The wire like link includes a serializer, on the first field programmable gate array, to serialize the plurality of signals; a deserializer on the second field programmable gate array, to deserialize the plurality of signals; and a connection between the serializer and the deserializer. The serializer and the deserializer are operated at a second clock frequency, greater than the first clock frequency, and the second clock frequency is selected such that latency of transmission and reception of the plurality of signals is less than the period corresponding to the first clock frequency.
Method of predicting degradation of fuel cell catalyst using the method of creating particle size distribution model
A particle size distribution creating method includes a particle size range determining step, an integrating step of integrating the frequency of appearance of particles within the particle size range determined in the particle size range determining step, a division point determining step of determining particle sizes that provide division points, using the integral of the frequency of appearance obtained in the integrating step, and a typical point determining step of determining the minimum particle size, maximum particle size and the particle sizes of the division points as typical points. This method is characterized by assuming a particle size distribution which contains particles having the particle sizes of the respective typical points and is plotted such that the frequency of appearance of the particles having the particle size of each of the typical points is equal to the integral over each of the regions defined by the typical points, and obtaining the assumed particle size distribution as a particle size distribution model.
Computer-assisted method for optimising surfaces of composite-material structures
Computer-assisted method for optimizing surfaces of composite-material structures as part of a design process that includes the following stages: a) Providing a multi-cell surface (11) of the structure obtained using aerodynamic calculations; b) Transforming said multi-cell surface (11) into an optimized surface (13) with fewer cells, concatenating contiguous cells and maintaining point and tangent continuity between them; c) Using said optimized surface (13) as geometric master when designing the components of the structure. The method is particularly applicable to the design of structures with a plurality of components and in particular fuselages of aircraft made of composite material. The invention also relates to a computer program for performing the method.
Portable computing device and method for asset management in a logistics system
Systems, methods, and computer program products are provided for tracking one or more items. In one exemplary embodiment, there is provided a device for tracking one or more items. The device may include a plurality of sensors for detecting light, temperature, humidity, pressure, and acceleration. The device may also include a memory for storing information received from the plurality of sensors.
Simultaneous testing of semiconductor components on a wafer
Methods and apparatus are disclosed to simultaneously, wirelessly test semiconductor components formed on a semiconductor wafer. The semiconductor components transmit respective outcomes of a self-contained testing operation to wireless automatic test equipment via a common communication channel. Multiple receiving antennas observe the outcomes from multiple directions in three dimensional space. The wireless automatic test equipment determines whether one or more of the semiconductor components operate as expected and, optionally, may use properties of the three dimensional space to determine a location of one or more of the semiconductor components. The wireless testing equipment may additionally determine performance of the semiconductor components by detecting infrared energy emitted, transmitted, and/or reflected by the semiconductor wafer before, during, and/or after a self-contained testing operation.
Systems and methods for latency and measurement uncertainty management in stimulus-response tests
Disclosed are systems and methods for managing testing unit latency and measurement uncertainty in computer-based stimulus-response tests. An estimated latency LE and an associated measurement uncertainty are determined as characteristics of a particular testing unit. LE is used as offset for all measurements taken on the testing unit, and results treated subject to the characteristic measurement uncertainty when determining test-taker performance. Estimated actual response times RTE are processed subject to a confidence value determined from the uncertainty. Uncertainty propagation determines test metrics involving a plurality of estimated actual response times RTE, where cumulative uncertainty is reported as a confidence rating in the metric. Overall test results (e.g., pass vs. fail) based on one or more metrics are also reported according to a confidence rating associated with the cumulative uncertainty propagated through the relevant metrics. Various calibration techniques are disclosed for determining the latency estimate LE and associated uncertainty values.
Method and apparatus for sensing drag of a fishing line
An electronic sensor employs a strain gauge controlled by a microprocessor on a circuit board. The processor operates software to measure electric impulses from the strain gauge and to convert them into digitally recognizable numbers. Software provides for calibration of the electronic sensor specific fishing rods. The software also controls an LCD read-out device to allow the user to preset a known drag resistance force in suitable units of measure on the fishing reel and to continually read out the amount of force pressure on the fishing line after hook-up so that a user can apply maximum pressure on a fish while fighting the fish without breaking the fishing line.
Device and method for determining and indicating climate-relevant effects of a contrail produced by an airplane
The invention relates to a device and a method for determining and indicating, on board of an airplane, climate-relevant effects of a contrail produced by the airplane. The method for determining and indicating, on board of an airplane, climate-relevant effects of a contrail produced by the airplane includes determining radiation data of short-wave and long-wave atmospheric radiation directed upwards in the earth atmosphere at location of the airplane, determining an air temperature and air humidity at the location of the airplane, determining a zenith angle of the sun at the location of the airplane, determining a radiative forcing value produced by the contrail based on the determined radiation data, the air temperature and air humidity, and the zenith angle, and indicating at least one of the radiative forcing value and variables derived therefrom.
Medical apparatus for extracorporeal blood treatment and method for determining a blood parameter value in a medical apparatus thereof
A medical apparatus for extracorporeal blood treatment and a method for determining blood parameter value have been provided. The medical apparatus has a control unit (9) configured for taking from a storage memory (10) a plurality of blood parameter value measures each made through the sensors (8) provided on the bloodline set of each of a machines plurality at different patient treatment sessions; all the blood parameter values relate to the same patient; receiving at least a corresponding laboratory measured value of the same blood parameter relating to the same patient and a laboratory measurement time; determining a correction factor function of a difference between a measured value made though the sensor and a laboratory measured value; obtaining an actual value of said blood parameter by varying at least the last measure made through the sensor by means of the correcting factor.
Methods for assembling panels of cancer cell lines for use in testing the efficacy of one or more pharmaceutical compositions
The present invention relates to algorithms for use in defining genomic subgroups of tumors and cancer cell lines. The present invention also relates to methods for assembling panels of tumors and cancer cell lines according to genomic subgroups for use in testing the efficacy of one or more pharmaceutical compounds in the treatment of subjects suffering from at least one cancer.
Method and apparatus for precise positioning of a borehole measurement instrument
A system and method for use in a downhole tool having distance measurement, feature detection, and primary measurement devices positioned therein are provided. In one example, the method includes recording a first plurality of features and corresponding positions in a first log using the feature detection device and the distance measurement device, respectively. A first feature of the first plurality of features is selected and the position corresponding to the first feature is identified. The feature detection device is aligned relative to the first feature based on the identified position. A first primary measurement is taken using the primary measurement device while the feature detection device is aligned relative to the first feature. The steps of recording, selecting, moving, and taking are repeated to obtain a second primary measurement while the feature detection device is aligned relative to a second feature of a second plurality of features.
Track prediction and identification via particle motion with intent
Provided is a system and method for tracking and identifying a target in an area of interest based on a comparison of predicted target behavior or movement and sensed target behavior or movement. Incorporating aspects of both particle diffusion and mobility constraint models with target intent derivations, the system may continuously track a target while simultaneously refining target identification information. Alternatively, the system and method are applied to reacquire a target track based on prioritized intents and predicted target location.
Systems and methods for generating a navigation chart
In one aspect, a system for generating a navigation chart is provided. The system includes a display device and a computing device coupled to the display device. The computing device is configured to receive at least one of current geographic position data from a navigation instrument and a desired geographic position input by a user and to generate a navigation chart having a geographic area that corresponds to one of the current geographic location and the desired geographic position and that includes at least one navigation aid, the navigation chart includes at least one navigation aid symbol corresponding to a position of the navigation aid within the geographic area. The computing device is further configured to determine whether each navigation aid is visible at a predetermined position within the geographic area and to display the navigation chart on the display device.
Method of determining and validating navigational priority settings utilizing probe data
A method for determining vehicle priority settings (30) at an intersection (26) is provided comprising accumulating probe data (24) from a plurality of individual navigation units (20). An intersection within a digital map (14) is selected, and a plurality of probe traces (32) are selected. The probe traces (32) are processed in a method characterized by selecting a pair of probe traces (32) that enter the intersection (26) at the same time on different trajectories (34). It is determined which of the probe traces (32) proceeds through the intersection first and an intersection priority matrix (36) is updated accordingly. This intersection priority matrix (36) is utilized to formulate at least one derived intersection priority setting (38).
Vicinity environment estimation device with blind region prediction, road detection and intervehicle communication
A vicinity environment estimation device includes neighborhood monitoring sensors that detect another vehicle, a car navigation system that acquires information about an untravelable region where a vehicle cannot travel, a vehicle-to-vehicle communication instrument that acquires information about detectable regions and results of detection of neighborhood monitoring sensors mounted in the another vehicle by wireless communication, and an ECU that estimates presence of a vehicle in the neighborhood of a host vehicle. When a blind closed region surrounded by detectable regions of the neighborhood monitoring sensors mounted in the another vehicle received by the host vehicle, detectable regions of the neighborhood monitoring sensors mounted in the host vehicle, and the untravelable region is formed, the ECU estimates the number of vehicles in the blind closed region which is not directly detectable by the neighborhood monitoring sensors, by continuously managing the entry/exist of vehicles to/from the blind closed region.
Variable valve timing for cylinder deactivation
Methods and systems are provided for adjusting cylinder valve timings to enable a group of cylinders to operate and combust while another group of cylinders on a second are selectively deactivated. Valve timing may be adjusted to allow flow of air through the inactive cylinders to be reduced, lowering catalyst regeneration requirements upon reactivation. The valve timing may alternatively be adjusted to enable exhaust gas to be recirculated to the active cylinders via the inactive cylinders, providing cooled EGR benefits.
Method for correcting injection quantities and/or times of a fuel injector
In a method for individually correcting injection quantities and/or times (mf1, mf2, mf . . . ; ti1, ti2, ti . . . ) in particular for a ballistic operating range of a fuel injector (1, 2, . . . ), a quantity deviation of an actual injection quantity (mf1, mf2, mf . . . ) from a nominal injection quantity (mfnom) of the fuel injector (1, 2, . . . ) during operation of the fuel injector (1, 2, . . . ) is determined, and a typical injection characteristic (fup1, fup2, fup . . . ) of the fuel injector (1, 2, . . . ) is adapted to a nominal injection characteristic (fupnom) based on the quantity deviation. Furthermore, a controller, in particular an engine controller may implement the above method.
Variable valve timing control apparatus for engine
A variable valve timing control apparatus includes a variable valve timing device and a valve timing controller to control the variable valve timing device in a manner that an actual VCT phase coincides with a target VCT phase. When the target VCT phase is set into a predetermined phase, learning means learn the predetermined phase as a reference phase. When determining means determine that there is a learning requirement of the reference phase, enlarging means enlarge an engine operation area where the target VCT phase is set into the reference phase by shifting the target VCT phase to the reference phase in an area where the target VCT phase is close to the reference phase.
Gas turbine engine controller with event trigger
A feedback control system is provided and includes a controller to control an operation of a motive element in accordance with current and previous measured states. The controller includes a servo, a processor and an event trigger controller. The event trigger controller is configured to cause the processor to command the servo to perform model based control (MBC) executions in an event a difference between the current and previous measured states exceeds a threshold based on the previous measured state or the current measured state exceeds a limit, and skip the MBC executions in an event the difference does not exceed the threshold and the current measured state does not exceed the limit.
Full authority digital engine control system for aircraft engine
In one aspect, a digital engine control system for an aircraft engine is provided. The control system includes a selection unit, the selection unit including a monitoring module configured to determine a measurement of the speed of rotation of the engine from the output signal from one or more protection sensors and to compare the or each speed measurement determined by the selection unit with speed measurements supplied by electronic control units to determine an operating state of each electronic control unit.
Inter-vehicle distance control device
An inter-vehicle distance control device is provided. In this control device, an inter-vehicle distance detecting section detects an inter-vehicle distance between an own vehicle and a preceding vehicle traveling in front of the own vehicle. A laterally adjacent vehicle detecting section detects another vehicle present beside the own vehicle. A cut-in detecting section judges whether or not a cut-in by the other vehicle detected by the laterally adjacent vehicle detecting section is likely to occur, before the other vehicle cuts in between the own vehicle and the preceding vehicle. An inter-vehicle distance adjusting section performs an inter-vehicle distance extension adjustment to increase the inter-vehicle distance when the cut-in detecting section judges that a cut-in is likely to occur. An inter-vehicle distance control section controls the inter-vehicle distance based on information from the inter-vehicle distance adjusting section.
System and method for vehicle speed monitoring using historical speed data
A target (not-to-exceed) speed for a vehicle over a road segment ahead of the vehicle is established based on a desired relationship with a speed profile of the segment. The speed profile is generated by analyzing a statistical distribution of historical speed data over the segment collected by probe vehicles. A driver alert is activated if the vehicle is likely to exceed the target speed based on at least one measured vehicle dynamic property. The target speed may be established by identifying a baseline road segment over which the vehicle has previously travelled and which is similar to the approaching road segment, comparing a past speed of the vehicle over the baseline segment with a speed profile of the baseline segment to determine a speed differential, and applying the speed differential to the speed profile of the approaching segment.
Prediction of driver-specific cruise speed using dynamic modeling
A controller for predicting cruising speeds of a vehicle includes a processor and an extracting unit to extract feature data from segments of a prior trajectory of the vehicle, the feature data including cruising speeds of the vehicle and predictive feature data. The controller also includes a model generator to generate a probabilistic model associating the predictive feature data with the cruising speeds of the vehicle and a predicting unit to predict a cruising speed of the vehicle for a target segment, which is an upcoming cruising segment of the vehicle, by conditioning the probabilistic model on real-time predictive feature data of segments of a current trajectory.
Shift control device of automatic transmission
A target shift stage comes to a high speed stage at t2, during reduction toward zero of a motor torque by an accelerator pedal releasing operation from t1, and an up-shift shift request along with the torque reduction is generated. The shift request is executed for the first time at t3, and the automatic transmission is shifted up to a high speed stage from a current low speed stage selecting state. Therefore, even in the case that a request for increasing a motor regenerative torque is issued by a braking operation just after (t2 to t3) an up-shift shift request moment t2 in response to the torque reduction, the gear shift in response thereto is not generated, and it is possible to avoid generation of repeated gear shift of low speed stage→high speed stage→low speed stage for a short time.
Methods and systems for engine shut-down control
An example method of operation comprises, selectively shutting down engine operation responsive to operating conditions and without receiving an engine shutdown request from the operator, maintaining the automatic transmission in gear during the shutdown, and during an engine restart from the shutdown condition, and with the transmission in gear, transmitting reduced torque to the transmission. For example, slippage of a forward clutch of the transmission may be used to enable the transmission to remain in gear, yet reduce torque transmitted to the vehicle wheels.
Method to control a transmission brake
A method of controlling a transmission brake of an automated change-speed transmission, of a countershaft design provided with claw clutches, the brake being functionally connected, on its input side, to a transmission shaft and actuated hydraulically or pneumatically by way of inlet and outlet valves such that, for an upshift from a gear under load to a target gear, when the loaded gear is disengaged, in order to synchronize the target gear, first the inlet valve is opened and the outlet valve is closed, then to produce a substantially constant braking torque, the inlet valve is closed after having been open for a determinable opening duration, and to reach a synchronous rotational speed, the outlet valve is opened after having been closed for a determinable closing duration. The time during which the inlet valve is open is determined as a function of a specified characteristic parameter of the synchronization process.
Self-arming immobilizer system, apparatus and method
There is disclosed a self-arming immobilizer system for immobilizing a vehicle. In an embodiment, the system comprises a signal input for receiving a signal indicating the absence of an authorized operator in a position of control in the vehicle; and an immobilizer unit adapted to receive the signal input, and in response to the signal indicating the absence of an authorized operator in a position of control in the vehicle, switch one or more relays to disable one or more circuits in the vehicle to immobilize and secure the vehicle. In an embodiment, the immobilizer unit is adapted to disable a gear shift link solenoid to disable the gear shift. In another embodiment, the immobilizer unit is adapted to disable a gun rack solenoid to lock the gun rack. In another embodiment, the vehicle is immobilized at idle, and the system allows the vehicle to keep idling until deactivated by an authorized operator.
Torque and speed control in a machine with continuously variable transmission
A method regulates the torque output and/or speed output of a continuously variable transmission (CVT) in a manner that may simulate a clutch. The CVT may be incorporated in a machine and maybe operatively coupled to a power source and to a propulsion device. The method utilizes an unaltered torque-to-speed curve that relates the torque output to the speed output of the CVT. The method may receive an operator input signal indicating a desire to change operation of the machine. The torque-to-speed curve may be shifted in response to the operator input signal to limit the torque output available. In an aspect, an under-run curve may be applied to the torque-to-speed curve, the under-run curve corresponding to a target speed. The operator input signal may also shift the under-run curve to reduce the target speed.
Method and device for adjusting a beam direction of a headlight, and motor vehicle
A method for adjusting a beam direction of a headlight of a vehicle having at least one front wheel and at least one rear wheel includes the following steps: a) detecting a front wheel steering angle of the at least one front wheel; b) detecting a rear wheel steering angle of the at least one rear wheel; c) defining a beam direction of the headlight depending on the front wheel steering angle and the rear wheel steering angle; and d) adjusting the beam direction of the headlight to the defined beam direction. The adjustment depends on whether the rear-wheel steering angle and the front wheel steering angle are oriented in the same direction or in opposite directions.
Integrated biometric switch
A user interface is provided. The interface can be used to control an electronic system that is in communication with a vehicle. The interface includes a fingerprint reader, and a push-button switch mounted to the fingerprint reader. The switch is configured to detect a user pressing upon a surface of the fingerprint reader. The interface includes a controller. The controller is configured to detect the user pressing upon the surface of the fingerprint reader using the push-button switch, and, after detecting the user pressing upon the surface of the fingerprint reader, capture fingerprint data of the user using the fingerprint reader.
Object tracking and steer maneuvers for materials handling vehicles
A materials handling vehicle automatically implements steer maneuvers when objects enter one or more zones proximate the vehicle, wherein the zones are monitored by a controller associated with the vehicle. The controller tracks objects in the zones via sensor data obtained from at least one obstacle sensor located on the vehicle and via dead reckoning. The objects are tracked by the controller until they are no longer in an environment proximate the vehicle. Different zones result in different steer maneuvers being implemented by the controller.
Remote monitoring terminal device for mobile work vehicle or vessel
Disclosed is a remote monitoring terminal device including: connection terminals (T, . . . ); a data storage control section for storing, in a first data storage section at predetermined intervals, only a predetermined number of latest data sets fed via the connection terminals (T, . . . ); a sampling data storage control section for storing in a second data storage section sampling data obtained by sampling the data stored in the first data storage section at sampling intervals (TC); and a communications section, wherein the sampling data storage control section transmits the sampling data stored in the second data storage section to the remote monitoring device via the communications section in response to a request from the remote monitoring device or in response to an end of a work.
Vehicle shut-down functionality for PEPS-equipped vehicles
A vehicle comprises a plurality of control module structures. A first control module structure is configured for determining a current motive mode of the vehicle. A second control module structure is configured for determining information indicating that a driver of the vehicle has left the vehicle unattended while the vehicle is in a motive-enabled mode. A third control module structure is configured for causing a secure idle mode to be implemented as a function of determining the information indicating that the driver of the vehicle has left the vehicle unattended while the vehicle is in the motive-enabled mode. Implementing the secure idle mode can include inhibiting the vehicle from being driveable until a driver access code is successfully received and authenticated by the vehicle.
Visual, GNSS and gyro autosteering control
A visual, GNSS and INS (gyro) system for autosteering control uses crop row and furrow row edge visual detection in an agricultural application in order to closely track the actual crop rows. Alternatively, previous vehicle tracks can be visually detected and followed in a tramline following operating mode. GNSS and inertial (gyroscopic) input subsystems are also provided for supplementing the video input subsystem, for example when visual references are lost. Crop damage is avoided or at least minimized by avoiding overdriving the existing crops. Other applications include equipment control in logistics operations.
Steering wheel device for indicating required supervisory control of a vehicle and method for use
A method and system may manage the driver's attention while driving. The driver may be driving using an autonomous driving system or limited-ability autonomous driving system. A steering wheel device may indicate to the driver a level of required supervisory control of a vehicle. The steering wheel device may include indicators to flash lights, vibrate, or provide other indicators. The indicators may have distinct levels of intensity for each level of supervisory control required to safely control a vehicle.
Vehicle driving system
A vehicle driving system includes a slip detector that detects an occurrence of excess slipping; an additive/subtractive slip point calculator that time-discretely calculates an additive/subtractive slip point, which is an additive slip point or a subtractive slip point, on the basis detection or non-detection of an occurrence of excess slipping; a cumulative slip point calculator that sequentially calculates a cumulative slip point that is a cumulative sum of values of the additive/subtractive slip point; and a driving mode switcher that switches between a two-wheel driving mode and an all-wheel driving mode on the basis of the cumulative slip point. When excess slipping is detected, the additive/subtractive slip point calculator calculates the additive slip point on the basis of a driving force correlation value that correlates to a driving force a driving wheel for which the excess slipping has occurred.
Control device of a vehicle
In a hybrid vehicle that is in a four-wheel drive system based on FF layout and that is switchable between a two-wheel drive state and a four-wheel drive state by an electronically controlled coupling 10, the electronically controlled coupling 10 is controlled to a release side when an engine 1 is started in an EV-4WD travel state so as to reduce the transmission amount of engine torque to a drive system of a side of rear wheels 8L and 8R.
Torque response control apparatus for electric motor of vehicle
A torque response control apparatus for an electric motor of a vehicle comprises a motor torque response control means that is configured to carry out finding a difference between a required acceleration that is variable in accordance with a change of a vehicle driving condition and an actual acceleration that is obtained, at the time of the change of the vehicle driving condition, with the aid of a torque characteristic of the electric motor, the difference being caused by the torque characteristic of the electric motor in which the maximum torque is varied in accordance with a rotation speed of the electric motor; and controlling the torque response of the electric motor in a manner to cause a driver to feel the difference of the actual acceleration from the required acceleration to be small by compensating the difference between the required acceleration and the actual acceleration.
Electric bicycle driving apparatus
An electric-bicycle driving apparatus includes a speed change mode operator to output a low-speed mode signal or a high-speed mode signal, a controller to receive the low-speed mode signal or high-speed mode signal outputted from the speed change mode operator and to output a first control signal corresponding to the low-speed mode signal or a second control signal corresponding to the high-speed mode signal, a generation-signal provider to provide a generation signal outputted from a generator, and a stepping operation load booster to boost a load of the generation signal outputted from the generation-signal provider by receiving the first control signal or second control signal when the speed change mode operator outputs the low-speed mode signal or high-speed mode signal, and to send a stepping operation provider a resulting signal of the boost in a stepping operation signal corresponding to the low-speed mode signal or high-speed mode.
System and method for determining a mismatch between a model for a powered system and the actual behavior of the powered system
A system is provided for determining a mismatch between a model for a powered system and the actual behavior of the powered system. The system includes a coupler positioned between adjacent cars of the powered system. The coupler is positioned in a stretched slack state or a bunched slack state based upon the separation of the adjacent cars. The system further includes a controller positioned within the powered system. The controller is configured to determine a mismatch of the model. A method is also provided for determining a mismatch between a model for a powered system and the actual behavior of the powered system.
System and method for determining dynamically changing distributions of vehicles in a vehicle system
A system and method for determining dynamically changing distributions of vehicles in a vehicle system are disclosed. The system and method determine handling parameters of the vehicle system. The handling parameters are determined for different distributions of the vehicles among different groups at different potential change points along a route. The system and method also determine whether to change the distributions at potential change points based on the handling parameters. Based on determining that the distributions are to change, a selected sequence of changes to the distributions is determined at one or more of the potential change points along the route. Change indices are generated based on the selected sequence. The change indices designate times and/or the one or more potential change points at which the distributions changes. The vehicles included in a common group have common designated operational settings while the vehicles are in the common group.
Data improvement system and method
A data improvement system, including an initial database, a verification database, and a processing device in communication with the initial database and the verification database. The processing device receives data from the initial database and the verification database, and determines verification data based thereon. A track data improvement system and a track database improvement system are also disclosed.
System, device, and method for presenting instrument approach procedure advisory information to a pilot on an aircraft
A present novel and non-trivial system, device, and method for presenting instrument approach procedure (“IAP”) advisory information to a pilot of an aircraft are disclosed. An advisory generator (“AG”) is programmed to retrieve or receive flight information representative of the current position of the aircraft, a designated airport, and at least one published IAP; weather minima data corresponding to each IAP; and one or more IAP suitability factors from a weather data source, a NOTAM data source, and/or an aircraft performance data source. The AG determines the suitability or availability of each published IAP, disables the pilot's selectability of each unsuitable or unavailable published IAP, and generates advisory data representative of information advising the pilot of the unsuitable or unavailable published IAP(s). Additionally, the AG is programmed to receive a pilot's override of an unsuitable or unavailable published IAP and enable the overridden unsuitable or unavailable IAP.
Method for operating an authorization device for a keyless access to and start of a vehicle
A method for operating an authorization device for keyless entry and starting of a vehicle with a portable ID transmitter that has a motion sensor. A wireless communication link for interchanging data messages can be set up between the authorization device and the ID transmitter. Keyless entry to the vehicle is permissible only when an instant of last movement of the ID transmitter, as captured by the motion sensor, is within a stipulated interval of time. The authorization device permits keyless starting of the vehicle only when keyless entry to the vehicle has previously been permitted.
Systems and methods for virtual ignition detection
Systems and methods for determining vehicle ignition state using a device added to the vehicle after the manufacture of the vehicle without a direct connection to the vehicle ignition line are disclosed. In a number of embodiments, a system includes a processor, a motion detector configured to detect vehicle motion and to enable the processor to obtain motion data, a Global Positioning System (GPS) receiver configured to determine location and to enable the processor to obtain at least speed data, and a radio transceiver configured to communicate with the processor. Additionally, the processor is configured to estimate the ignition state of a vehicle using at least the motion data and the speed data.
Managed electric vehicle traction battery system
Described embodiments include an electric vehicle battery system and a method. The electric vehicle battery system includes a rechargeable traction battery pack configured to supply electric power to a propulsion system of a vehicle. The system includes a data-gathering module configured to monitor or test an aspect of the traction battery pack and in response to generate a traction battery pack status report. The system includes a gatekeeper module configured to permit or deny the rechargeable traction battery pack (i) supplying electric power to the propulsion system or (ii) receiving a recharge, the permit or deny in response to a management instruction issued by a remote battery manager system. The system includes a communication system configured to communicate with the remote battery manager. In an embodiment, the system includes an on-board charging system configured to recharge the rechargeable traction battery pack.
Navigation portals for a remote vehicle control user interface
An operator control unit has a user interface that allows a user to identify a mode of display and interaction that narrows the user's options for his next interaction with the user interface. The user interface utilizes portals to transition between environments such as indoors to outdoors, outdoors to indoors, different rooms of a building, and different floors of a building, the portals representing one or more of stairways and doors, and being used in remote vehicle path planning as waypoints that may require execution of predetermined behaviors.
Message transmission control systems and methods
A message generation module generates a message that is to be transmitted to a serial data bus of the vehicle once per first predetermined period. A queue manager module resets a timer value when the message is added to a transmit queue and selectively adds the message to the transmit queue when: a number of messages in the transmit queue is less than a first predetermined value; the timer value is greater than the first predetermined period; and one of (i) the first predetermined period is less than a second predetermined period and (ii) the first predetermined period is greater than the second predetermined period and the number of messages in the transmit queue is less than a second predetermined value. The second predetermined value is less than the first predetermined value. A communication control module selectively transmits messages from the transmit queue to the serial data bus.
Systems and methods for controlling a chiller plant for a building
A computerized method for controlling a chiller plant for cooling a building is provided. The chiller plant has a chiller plant load. The method includes estimating an optimal combination of chiller plant equipment for meeting the chiller plant load. Estimating the optimal combination of chiller plant equipment includes using binary optimization to determine at least two potential combinations of chiller plant equipment. Estimating the optimal combination of chiller plant equipment also includes using nonlinear optimization to determine a potential power consumption minimum for each of the at least two potential combinations. The method also includes controlling the chiller plant according to the estimated optimal combination of chiller plant equipment.
Power plant operation enhancement
A power plant control system determines an augmented operating parameter set point responsive to a life cycle cost (LCC) objective function responsive to a LCC model. The augmented operating parameter value may be responsive to an initial set point determined by a controls model and a performance indicator determined by a performance model. The power plant may include a thermal generator, such as a gas turbine or other fuel-burning generator, and the operating parameter may include firing temperature, fuel flow rate, steam pressure/temperature/flow rate, and/or another suitable operating parameter. An offer curve is generated responsive to the augmented operating parameter.
Power control method and device
The present invention discloses a method and an apparatus for power control. An apparatus for power control in accordance with an embodiment of the present invention can include: a voltage comparing part configured to compute an error voltage by using a measured voltage measured at the generator and a reference voltage that is designated; a control module configured to compute a first reactive power value for power control of the generator by being inputted with the error voltage; and a driving module configured to compute a reference reactive power value by using the first reactive power value and a second reactive power value computed using an active power value of the power converter and configured to control the power converter in correspondence with the computed reference reactive power value.
System for optimizing and controlling particle size distribution and for scale-up of nanoparticle production in an aerosol flame reactor
The present invention relates to a system for optimizing and controlling the particle size distribution and scale-up of production of nanoparticle in an aerosol flame reactor. The method provides nanoparticles with desired, optimized and controlled particle size and the specific surface area in aerosol reactors using a simulation tool with programmed instructions. The simulation tool couples flame dynamics model and particle population balance model.
Robot control method, robot control device, and robot control system
A CPU of a robot control device calculates load torque based on the inertia force, centrifugal force or Coriolis force, gravity force, friction torque, and actuator inertia torque applied to a joint axis of each link, each time an orientation parameter indicative of the link position and orientation allowed by a redundant degree of freedom is sequentially changed, under a constraint of end-effector position and orientation as target values. The CPU obtains the link position and orientation at which the ratio of the load torque to the rated torque of a rotary actuator provided for each joint is minimized, while the orientation parameter is being changed, and provides a feed-forward value that gives rise to each load torque obtained when the ratio of the load torque to the rated torque of the rotary actuator is minimized, to a control command generated to the rotary actuator of each joint axis for achieving the end-effector position and orientation as target values.
Telematic interface with directional translation
Method and system for telematic control of a slave device. Displacement of a user interface control is sensed with respect to a control direction. A first directional translation is performed to convert data specifying the control direction to data specifying a slave direction. The slave direction will generally be different from the control direction and defines a direction that the slave device should move in response to the physical displacement of the user interface. A second directional translation is performed to convert data specifying haptic sensor data to a haptic feedback direction. The haptic feedback direction will generally be different from the sensed direction and can define a direction of force to be generated by at least one component of the user interface. The first and second directional translation are determined based on a point-of-view of an imaging sensor.
Calibration method for tool center point of a robot manipulator
A calibration method for calibration a tool center point for a robot manipulator includes the steps of: driving the tool to move above one of the inclined surfaces; defining a preset coordinate system TG; rotating the TCP relative to the UG-axis by about 180 degrees, calculating the value of Δw; updating the position parameters of the preset TCP, defining a new preset coordinate system TG′; rotating the TCP relative to the UG′-axis by about 90 degrees, calculating the value of Δv; updating the position parameters of the new preset TCP, defining a new preset coordinate system TG″; driving the tool to move above a planar horizontal surface; rotating the TCP relative to a axis by about 30 degrees, calculating the value of Δu; repeating the aforementioned steps until the deviation ΔP (Δw, Δv, Δu) is less than or equal to a maximum allowable deviation of the robot manipulator.
System for writing and dispensing solid-state storage devices
An apparatus for writing data to and dispensing one or more of solid-state devices is enclosed. A preferred device herein comprises a write port engageable with a solid-state storage device within a chamber via a hopper. The chamber is further provided for holding the solid-state storage device as the solid-state storage device engages with the write port. Additionally a transfer assembly is provided for moving the solid-state storage device from the chamber to dispense the solid-state storage device.
Apparatus for the handling of containers with a mobile display
An apparatus for handling containers, with at least one handling device which handles the containers in a pre-set manner, a conveying device which conveys the containers along a pre-set conveying path, with a control device for controlling the apparatus, with an input unit, by way of which information is capable of being entered in the apparatus by a user. The apparatus has an information output unit for delivering information to the user, wherein this information unit is made portable and is capable of being brought into at least indirect communication connection with the input unit.
Numerical control device
A numerical control device including a collision determining unit that detects a possibility of collision between a machine and an area set as an entry prohibited area; an operation-continuation instructing unit that instructs whether to continue an operation when the collision determining unit detects the possibility of collision and shaft movement is temporarily stopped; a machining-information storage unit that stores internal operation information of the numerical control device regarding the temporary stop when the operation-continuation instructing unit instructs continuation of the operation; and a collision-determination processing unit that invalidates a collision determination on the basis of the operation information stored in the machining-information storage unit when executing the same machining program the next and subsequent times.
Methods and systems for inspection of wafers and reticles using designer intent data
Methods and systems for inspection of wafers and reticles using designer intent data are provided. One computer-implemented method includes identifying nuisance defects on a wafer based on inspection data produced by inspection of a reticle, which is used to form a pattern on the wafer prior to inspection of the wafer. Another computer-implemented method includes detecting defects on a wafer by analyzing data generated by inspection of the wafer in combination with data representative of a reticle, which includes designations identifying different types of portions of the reticle. An additional computer-implemented method includes determining a property of a manufacturing process used to process a wafer based on defects that alter a characteristic of a device formed on the wafer. Further computer-implemented methods include altering or simulating one or more characteristics of a design of an integrated circuit based on data generated by inspection of a wafer.
3D printing on a rotating cylindrical surface
Disclosed herein is a device adapted to make a solid object. The device has a surface rotatable around an axis of rotation, and an applicator adapted to apply over at least one portion of the surface a material used to make the solid object. The applicator and the surface are displaceable relative to each other in a direction transverse to the axis. Disclosed herein are also methods of determining instructions for the device.
Optimized crowning in bevel gear wheels of a bevel gear transmission
The invention relates to a method for producing a bevel gear wheel, in particular for rudder propellers, the teeth of which have a macro geometry specific to the gear wheels, the teeth of which can be described by flank and profile lines, the flanks of which have a tooth flank micro topography and the bearing surface of which represents the contact region of the inter-meshing teeth. The crown of a tooth flank corresponds to the elevation of the tooth flank center with respect to the tooth flank edge, wherein the course of the height and width crowns of the flank surface is substantially shaped like a circular arc. By means of precise material removal, the micro topography of the tooth flank and thus the bearing surface is optimized firstly in that the material removal is carried out such that the end relief on the tooth flank surface is reduced toward the tooth heel side and the tooth toe side, an area having a greater length and width comes into engagement on the flank and thus an enlarged bearing surface is present, and secondly in that the course of the crown the crown of a tooth flank follows an approximately logarithmic, elliptical and/or an exponential curve shape, which runs through the point of contact, when the ease-off is viewed with no load, in a longitudinal section in the flank sectional surface and/or in a profile section in the profile sectional surface.
Audio systems and methods
An audio recorder may be configured to automatically send a copy of recorded audio to one or more destinations, such as, one or more default destinations associated with the audio recorder. The audio recorder may be configured to use a wireless connection to send the copy of the recorded audio. For instance, the audio recorder may form part of a wireless communication device that may be configured to send the copy of the recorded audio via one or more wireless connections and/or wireless networks to suitable destinations.
Diploid control of water heaters
A method of controlling a water heater is provided. The method comprises evaluating the fitness of solutions associated with a plurality of individuals in a population for a current operating environment of the water heater. Each of the plurality of individuals comprises a dominant genotype and a recessive genotype. Each genotype represents a solution for controlling the water heater. A fitness function is applied to the dominant genotype of each individual. The fitness function is based on at least one of water flow demand data and energy price data. The method further comprises storing previously encountered genotypes in the recessive genotypes of the individuals. The method further comprises selecting a solution for controlling operation of the water heater based on the fitness evaluation.
A handheld apparatus (100) provides a treatment level current to an outer conductive surface of the human body and includes an electrically conductive polyvinyl case (105) that provides a handhold to a user and an electrical ground to an apparatus circuit contained therein, the electrically conductive polyvinyl case (105) being electrically connected to a metal probe tip (170) which is electrically connected to a microchip (210) which provides the treatment level current to the metal probe tip, the treatment level current traveling through the outer conductive surface of the human body with the electrically conductive polyvinyl case (105) completing the apparatus circuit.
Establashing continuity between a shield within an implantable medical lead and a shield within an implantable lead extension
Implantable medical leads and implantable lead extensions include a shield. The implantable medical lead is coupled to the implantable lead extension. Stimulation electrodes of the implantable medical lead contact stimulation connectors within a housing of the implantable extension to establish a conductive pathway for stimulation signals from filars of the implantable extension to filars of the implantable medical lead. Continuity is established between the shield of the implantable medical lead and the implantable extension by providing a radio frequency conductive pathway within the housing. The radio frequency conductive pathway extends from a shield of the implantable extension to a shield connector that contacts a shield electrode of the implantable medical lead. The radio frequency conductive pathway may have various forms such as a jumper wire or an extension of the shield within the implantable extension.
Supply noise rejection in implantable medical devices
The present invention provides an implantable medical device having at least two electrodes coupled to the device housing. The electrodes may be configured for sensing physiological signals such as cardiac signals and alternatively for providing an electrical stimulation therapy such as a pacing or defibrillation therapy. In accordance with aspects of the disclosure, the device housing provides a hermetic enclosure that includes a first housing section that is hermetically coupled to a second housing section. At least one of the at least two electrodes is coupled to an exterior surface of the first housing section that encloses the battery components of the device. The first housing section is electrically insulated from the cathode and anode of the battery.
Transcutaneous energy transfer system with multiple secondary coils
A transcutaneous energy transfer (TET) system is provided having a plurality of secondary coils adapted for disposition in a patient, at least one primary coil configured to transmit transcutaneous energy, and a controller adapted for disposition in a patient. The controller includes circuitry to isolate the secondary coils from each other and direct electric current from at least one of the secondary coils to a charge storage device and/or implantable medical device.
Automatic power regulation for transcutaneous energy transfer charging system
Methods and systems for controlling power output from an external power source in a transcutaneous energy transfer (TET) system are provided to prevent inadvertent energy transfer when no secondary coil is present. The system operates by transmitting power transcutaneously from an external primary coil and determining whether a response from a secondary coil implanted within a patient is detected. If no response is detected, the power output of the primary coil is decreased. The decrease in power output can be accomplished by operating the primary coil at a lower average power level, which can include variations in power level, duty cycle, etc. The system can also be configured to periodically repeat the process in order to continue searching for a coupled secondary coil.
Diversity antennas for neurostimulator programming devices
The present disclosure involves a programmer configured to program an implanted medical device. The programmer includes a circuit board and first and second wireless communication devices located on the circuit board. The first wireless communication device is configured to operate in a first frequency band. The second wireless communication device is configured to operate in a second frequency band different from the first frequency band. The first and second wireless communication devices are each configured to communicate wirelessly with the implanted medical device. The programmer includes a first group of antennas coupled to the first wireless communication device. The antennas in the first group have first different positions on the circuit board. The programmer includes a second group of antennas coupled to the second wireless communication device. The antennas in the second group have second different positions on the circuit board.
Retinal implant with rectified AC powered photodiode
The present invention relates to a microelectronics element, such as an optical receiver element, for a medical implant device to be implanted in the human or animal body, particularly for a retinal implant device. The microelectronics element comprises a functional unit including application specific microelectronics, such as a photodiode, for performing a function in the medical implant device, and rectifier means adapted for converting an AC supply voltage into a DC voltage. The DC voltage provided by the rectifier means, or an operating voltage derived from the DC voltage, is configured to be supplied to the functional unit. Further, the functional unit and the rectifier means are integrated on a common semiconductor substrate and configured such that the rectifier means isolates the microelectronics element from application of an external DC supply voltage. The invention also relates to a medical implant device, such as a retinal implant, which incorporates such a microelectronics element.
Linked area parameter adjustment for spinal cord stimulation and associated systems and methods
Systems and methods for managing pain in a patient using an electrical waveform that link the modulation of a waveform parameter for different areas of a patient. One embodiment in a system for managing pain in a patient comprises an electric device configured to be implanted into the patient and including a plurality of electrodes having at least a first electrode associated with a first area of the patient and a second electrode associated with a second area of the patient. The system further includes an implantable device configured to be coupled to the electrode device and having a computer-operable medium programmed to change the waveform parameter applied to the first electrode and automatically set the waveform parameter applied to the second electrode based on a relationship between a first therapy range and a second therapy range of the waveform parameter.
Devices for controlling spinal cord modulation for inhibiting pain, and associated systems and methods, including controllers for automated parameter selection
Devices for controlling spinal cord modulation for inhibiting pain, and associated systems and methods, including controllers for automated parameter selection are disclosed. A particular embodiment includes receiving a first input corresponding to a location of a signal delivery device implanted in a patient, establishing a positional relationship between the signal delivery device and an anatomical feature of the patient, receiving a second input corresponding to a medical indication of the patient, and, based at least in part on the positional relationship and the indication, automatically identifying a signal delivery parameter in accordance with which a pulsed electrical signal is delivered to the patient via the signal delivery device.
Implant with antenna array
Implant devices described herein may be adapted to communicate with other devices via an antenna array. The antenna array may be configured to minimize radiation to surrounding tissue and/or maximize signal power in a direction of device(s) with which the implant device communicates.
Tracking pacing effectiveness based on waveform features
Methods and/or devices may be configured to track effectiveness of pacing therapy by monitoring two or more electrical vectors of the patient's heart during pacing therapy and analyzing at least one feature of a morphological waveform within each of the two or more electrical vectors.
System and method for neural stimulation
Various aspects provide an implantable device. In various embodiments, the device comprises at least one port, where each port is adapted to connect a lead with an electrode to the device. The device further includes a stimulation platform, including a sensing circuit connected to the at least one port to sense an intrinsic cardiac signal and a stimulation circuit connected to the at least one port via a stimulation channel to deliver a stimulation signal through the stimulation channel to the electrode. The stimulation circuit is adapted to deliver stimulation signals through the stimulation channel for both neural stimulation therapy and CRM therapy. The sensing and stimulation circuits are adapted to perform CRM functions. The device further includes a controller connected to the sensing circuit and the stimulation circuit to control the neural stimulation therapy and the CRM therapy. Other aspects and embodiments are provided herein.
Implantable medical device having power supply for generating a regulated power supply
A device for generating a plurality of output voltages from a single input energy supply source is described. The device includes a switched capacitor voltage converter that provides each of the output voltages having different supply ratios. The supply ratio is defined as a function of the input voltage provided to the switched capacitor voltage converter by the energy supply source. The switched capacitor voltage converter includes a plurality of capacitors selectively coupled to a plurality of switches that dynamically configure the capacitors into a plurality of stacked configurations. Switching between the plurality of stacked configurations may be controlled based on predetermined criteria.
System and method for avoiding undersensing of ventricular fibrillation
A medical device and associated method for detecting and treating tachyarrhythmias acquires a cardiac signal using electrodes coupled to a sensing module. Cardiac events are sensed from the cardiac signal and a processing module computes a first morphology metric for each sensed cardiac event occurring during a time segment of the cardiac signal. The first morphology metrics corresponding to an event originating in a ventricular chamber are counted. The first processing module computes a second morphology metric for the time segment of the cardiac signal in response to the count of the first morphology metrics meeting a threshold number of events. The time segment is classified as a shockable segment in response to the second morphology metric meeting a detection criterion.
System and method for characterizing circulatory blood flow
A computer-implemented method for characterizing circulatory blood volume and autoregulatory compensatory mechanisms to maintain circulatory blood volume is disclosed. A biological signal that emulates the arterial pulse wave is collected from a sensor. Three derived parameters are extrapolated from the biological signal. The first parameter, circulatory stress, reflects of the changes of the heart rate frequency. The second, circulatory blood volume, reflects the changes in the frequency strength of the heart rate frequency. The third, Pulse Volume Alteration (PVA) Index is a ratio of the sum of the strengths of the heart rate frequency harmonics to the strength of the heart rate frequency of the unprocessed biological signal. Each parameter is compared to a threshold value and assessed to determine an adequacy of circulatory blood volume and an appropriateness of the autoregulatory mechanisms used to maintain circulatory blood volume adequacy.
System and method for integrating electromagnetic microsensors in guidewires
A system and method of integrating electromagnetic microsensors into interventional endovascular devices such as guidewires for tracking guidewires within vessels of a body with the use of a surgical navigation system.
System and method for image-based interventional device tracking and scan plane guidance
An MR system and method for tracking a device of an interventional procedure within a scan subject is disclosed. At least two MR projections of the device are acquired, from which 3D coordinates of the device are determined. Subsequent image acquisition is adjusted with respect to the coordinates of the device to guide movement thereof towards target anatomy. The present system and method provide the ability to locate and visualize continuous portions of an interventional device in 3D, and do not require the use of embedded RF localizing coils.
Method and device for calibrating a medical instrument
A system and method for calibrating an object having at least one marker attached thereto, wherein a spatial position of the object is ascertained based on the at least one marker, and an outline, view or geometry of the object is optically detected from at least one side. The detected outline, view or geometry is compared with corresponding outlines, views or geometries of stored pre-calibration data of the object, said pre-calibration data representing a model of the object.
Methods for detecting abnormalities and degenerative processes in soft tissue using magnetic resonance imaging (MRI)
The present invention provides methods to detect degenerative processes and abnormalities in soft tissues at high spatial resolution, high signal-to-noise ratio and short scanning times, based on quantitative tissue properties. These methods might provide a useful tool to detect and assess abnormalities in soft tissues and to monitor disease progression.
Haptic guidance system and method
A surgical apparatus includes a surgical device, configured to be manipulated by a user to perform a procedure on a patient, and a computer system. The computer system is programmed to create a representation of an anatomy of a patient; to associate the anatomy and a surgical device with the representation of the anatomy; to manipulate the surgical device to perform a procedure on a patient by moving a portion of the surgical device in a region of the anatomy; to control the surgical device to provide at least one of haptic guidance and a limit on manipulation of the surgical device, based on a relationship between the representation of the anatomy and at least one of a position, an orientation, a velocity, and an acceleration of a portion of the surgical device; and to adjust the representation of the anatomy in response to movement of the anatomy during the procedure.
Power management for wireless direct link
Disclosed herein are exemplary techniques for managing power in a direct wireless link between two wireless devices. The present disclosure provides at least three direct link power management techniques: Fast Resumption Mode (FRM) wherein the direct link is resumed automatically at a specified timing synchronization function (TSF); Slow Resumption Mode (SRM) wherein the direct link may be resumed by sending a Resume-Request via the access point; and Reverse Polling (RP), wherein one peer station of the direct link is continually awake and the other peer station uses reverse polling to start a service period. Thus, a method for power management of a direct wireless link between two wireless devices is disclosed. The method comprising the steps of establishing a direct wireless link between the first wireless device and the second wireless device; transmitting, from a first wireless device, a frame having a time value; receiving, at the second wireless device, the frame from the first wireless device; suspending the direct wireless link a duration determined based on the time value; and resuming the direct wireless link at a time determined based on the time value.
Method and system for migrating from coaxial cable to hybrid cable base station installations
Systems, methods, and computer-readable media for migrating from coaxial cable to hybrid cable base station installations with zero or partial down-time are provided. In embodiments, the method includes determining, based on operational measurement data, a sector associated with a base station having the least traffic. Each sector supported by two conduits feeding two coaxial cables to an antenna. A channel count associated with the determined sector is reduced so that all transmits fit on a single coaxial cable resulting in an unused conduit and an unused coaxial cable. A hybrid cable is installed and activated so that all traffic for the determined sector is moved to the hybrid cable. Additional hybrid cables are installed to replace unused coaxial cables until traffic for all sectors has been moved to hybrid cables, which frees half the conduits for other use.
Portable terminal and wireless module
A portable terminal and a wireless module are disclosed. The portable terminal comprises a terminal body and a wireless module. The terminal body comprises a front surface and a back surface opposite to each other, side surfaces connected to the front surface and the back surface, and a terminal circuit board disposed in a space defined by the front surface, the back surface and the side surfaces together; and a display region is disposed on the front surface. The terminal body is provided on one of the side surfaces thereof with a slot for the wireless module to be inserted therein. Disposed on a module circuit board of the wireless module is an SIM card that is electrically connected to the module circuit board. In this way, the present disclosure can selectively reduce the cost of the portable terminal and substantially not increase the size of the portable terminal.
System for detecting usage of a wireless phone in an automobile
A vehicle includes a detection module including a directional antenna and signal processing logic. The detection module is located within the vehicle, arranged with respect to a driver region, and configured to detect a condition wherein a wireless phone is operated within the driver region. The detection module generates an output indicative of the detected condition. The vehicle further includes a controller configured to receive the output, and control the vehicle in response to the detected condition.
Terminal and method for recognizing communication target
A terminal and method for recognizing a communication target within a visible range. The method of a terminal to recognize a communication target includes obtaining location information of a communication target whose identification information is unknown within a visible range of a terminal user; and recognizing a relative location of the communication target with respect to the terminal based on the obtained location information and displaying the recognized relative location of the communication target.
Apparatus and method for content display in a mobile terminal
An apparatus and method for content display in a mobile terminal include: a sensing unit including a location determiner generating current location information of the mobile terminal including latitude, longitude and altitude; a content storage storing content items; a control unit controlling a process of storing, when a content item is created, the created content item together with location information in the content storage, setting a display region for content display, examining location information of stored content items, and displaying content items created at a place belonging to the display region in three dimensions; and a display unit displaying content items at corresponding places of the display region under control of the control unit.
Method, mobile and base station for direct mobile to mobile communication
According to the present invention, a source MS, determining initiation of M2M communication or receiving a request for initiating M2M communication from a BS, receives a reference signal for channel quality measurement of a neighboring MS, and the channel quality of the source MS and the neighboring MS is measured by using the reference signal; and information representing the channel quality is transmitted to the BS. Or, the neighboring MS receives a reference signal for channel quality measurement transmitted by the source MS, a channel quality of the source MS and the neighboring MS is measured by using the reference signal, and information representing the channel quality is transmitted to the BS. The BS determines a partner MS for M2M communication with the MS on the basis of a channel quality between the source MS and the neighboring MS.
Method and system with adjusted power headroom reports for uplink resource allocation
A wireless network allocates uplink resources to wireless communication devices (WCDs) based on power headroom reports, with more resources being allocated to WCDs reporting greater power headrooms. Each WCD may determine a respective power headroom as a difference between its maximum transmit power and a transmit power requirement for its current uplink resource allocation. However, a WCD may report an adjusted power headroom that is obtained, for example, by decreasing its respective power headroom by an adjustment value. The WCD may then receive an uplink resource allocation that is based on the adjusted power headroom that it reported. The adjustment value could be based on a priority level of the WCD, a priority level of data to be transmitted by the WCD, and/or an instruction from the wireless network. In one example, basic-priority WCDs report adjusted power headrooms so that more uplink resources are available for high-priority WCDs.
Interactive system and process
A method of delivering an instruction (206) to a mobile user device (106) connected to a network (110) is disclosed. The method comprising the steps of receiving an interactive workflow (202), translating the interactive workflow into the instruction (206) in a form executable by the mobile user device (106), and sending a message (208) including the instruction (206) to the mobile user device (106).
Method and arrangement in a telecommunication system
There is provided a method for use in a user equipment when the user equipment is in idle mode or any other low activity state, and when the user equipment bandwidth is smaller than the cell transmission bandwidth. The method comprises the steps of determining a paging position of the user equipment in the frequency domain; receiving, from the network, paging information within the user equipment reception bandwidth; and changing, if indicated by the network, the paging position of the user equipment within the cell transmission bandwidth.
Information processing system, mobile information terminal, server, and information processing method
A task management system includes a game terminal and a server. The game terminal acknowledges user designation of whether positional information indicating a position arbitrarily designated by a user on a map of a scale displayed on the terminal or positional information indicating the current position of the terminal should be added to data that should be stored in the server along with the positional information. The game terminal transmits the data to which user designated positional information is added to the server. The server stores the data transmitted from the game terminal along with the positional information.
Proximity-based notifications in a mobile device
Methods, program products, and systems for proximity-based notifications are described. A proximity-based notification system can receive a request to be notified when a contact's mobile device is in proximity to a user's mobile device, obtain permission to receive information associated with the contact, receive the information associated with the contact, detect that the contact's mobile device is in proximity to the user's mobile device based on the information associated with the contact, and notify the user that the contact's mobile device is in proximity to the user's mobile device.
Presence detection based on crowd surfing signal strength
A method includes receiving wireless signals from consumer devices that are in communicable range of the merchant device. The wireless signals each include a unique identifier associated with one of the consumer devices. The method further comprises generating signal strength data that includes one signal strength value associated with the unique identifier of each of the wireless signals, storing the signal strength data in a data storage device, analyzing the signal strength data to determine how many of the consumer devices achieved various signal strength levels, determining a threshold signal strength value based on the analysis, determining a consumer device is present within a physical area when a subsequent wireless signal from a subsequent consumer device is greater than the threshold signal strength value.
Measurements for indoor navigation
A method of obtaining and using access point signal information includes: receiving signals at a mobile device from a first set of access points during a passive measurement; and performing a first active measurement at the mobile device for the first set of the access points, including: sending at least one first communication each sent toward a respective one of the access points of the first set; and receiving at least one second communication each corresponding to, and responsive to, one of the at least one first communication and received from a corresponding one of the access points of the first set; where the passive measurement and the first active measurement is each performed repeatedly with the first set of the access points being reestablished at each repeat performance of the passive measurement, and with the passive measurement being performed less often than the first active measurement.
Locating system for autistic child and others
Mentally challenged persons such as autistic children and Alzheimer's patients can become lost and they are hard to find because they have difficulty communicating or they are confused and disoriented. The present invention provides an apparatus, system and methods for locating lost persons (or animals or packages) whether they are indoors or outdoors. The apparatus comprises a cellular telephone unit which can be activated by a RF signal and which a child or patient can wear. The wearable unit can be activated by a caregiver's smart phone having a locating application installed therein. The locating application enables the caregiver to locate the lost person using radio direction finder triangulation when the lost person is within a few hundred feet of the caregiver. When the lost person is further away, the locating application employs cell phone tower triangulation or the wearable unit GPS/Assisted GPS application to determine an approximate location of the lost person. As the caregiver moves close enough to the approximate location, the radio direction finder triangulation is used to calculate a more exact location to find the lost person.
A mobile communications system is proposed in which mobile communications devices are arranged to carry out signal measurements on the signals received from neighboring cells. The bandwidth over which these signal measurements are carried out is determined in dependence upon the bandwidths of the neighboring cells and is signalled to the mobile communication device by a serving base station.
System, method, and computer-readable medium for concurrent termination of multiple calls at a mobile terminal
A system, method and computer-readable medium for allocating multiple subscriptions to a single mobile terminal thereby allowing concurrent termination of multiple calls at the mobile terminal are provided. A mobile terminal adapted to terminate multiple concurrent calls is described. In one implementation, a network need not have any configuration data regarding the multi-line capabilities of the mobile terminal. In other implementations, network-centric mechanisms are provided for allowing multiple concurrent calls to be terminated by a mobile terminal. Multiple concurrent calls may be terminated at a mobile terminal on separate carrier frequencies or alternatively may be terminated on a common carrier frequency.
Base station, method and computer program product
A base station, a method and a computer program product are disclosed. The base station is operable, in concert with other base stations within a group, to support wireless communications with user equipment. The base station comprises: transmission logic operable to generate a cell having a coverage area supporting wireless communications with user equipment; reception logic operable to receive load information indicative of a user equipment communications load experienced by base stations within said group; and coverage area adjustment logic operable to determine changes required to said coverage area to change a user equipment communications load experienced by at least one base station within said group. In this way, it can be seen that each base station within the group may receive information about the user loading on other base stations within that group and is able to adjust its coverage area to cause that communications loading to be rebalanced to enable efficient use of resources and optimize the overall performance of each of the base stations within the group. The group of base stations with co-ordinated and optimized coverage can achieve higher end user data rates and improved quality of service than would otherwise be possible.
Method for enhancing the handover of a mobile station and base station for carrying out the method
The invention concerns a method for enhancing the handover of a mobile station (20-23) from a serving base station (1) of a cellular network to a new base station, the new base station is selected among a neighbor list including neighboring base stations, the radio coverage cell (r2-r8) of which overlaps the radio coverage cell (r1) of said serving base station (1). It is also provided the base station for carrying out the method. According to the invention it is determined a current sector (s1-s3; s1-s6) in which said mobile station (20-23) is located among a plurality of sectors (s1-s3; s1-s6) partitioning the radio coverage cell (r1) of said serving base station (1), and the neighbor list includes only the neighboring base stations the radio coverage cell (r2-r8) of which overlaps said current sector (s1-s3; s1-s6).
Access point identification based on multiple pilot signature indicators
An access point is identified based on a plurality of pilot signatures. Here, in addition to transmitting a pilot signal that is encoded (e.g., spread/scrambled) using a particular pilot signature, an access point transmits a message that includes at least one indication of at least one other pilot signature. For example, an access point may use one PN offset to generate a pilot signal and transmit a message that identifies at least one other PN offset. An access terminal that receives the pilot signal and the message may then generate a pilot report that identifies all of these pilot signatures. Upon receiving a handover message including this pilot-related information, a target network entity with knowledge of the pilot signatures assigned to that access point may then accurately identify the access point as a target for handover of the access terminal.
Method for categorization of multiple providers in a wireless communication service environment
A communication device locates a preferable wireless service provider in a multi-service provider environment using a frequency band search schedule. Initially, the communications device registers with a less preferred service provider in a first frequency band. While remaining registered with the less preferred service provider, the device examines several frequency bands in the order specified by the frequency band search schedule. A frequency band is examined by dividing the frequency band into many sub-bands, and by locating the strongest signal above a threshold within the sub-band being examined. The examination continues until a second frequency band having a more preferred service provider is located. The communication device then registers with the more preferred service provider. The category of service provider may be identified and displayed on the communication device.
Interference control, SINR optimization and signaling enhancements to improve the performance of OTDOA measurements
A wireless terminal receives signaling information, pertaining to a reference signal transmission in at least one specifically designated sub frame, the signaling information including a list, the list including base station identities. The terminal determines, from at least one of the base station identities in the list, the time-frequency resources associated with a reference signal transmission intended for observed time difference of arrival (OTDOA) measurements from a transmitting base station associated with said one base station identity. The time of arrival of a transmission from the transmitting base station, relative to reference timing, is measured. The wireless terminal can receive a command from a serving cell to start performing inter-frequency OTDOA measurement on a frequency layer containing reference signals, the frequency layer distinct from the serving frequency layer, the serving frequency layer not containing positioning reference signals. The wireless terminal can perform OTDOA measurements subsequent to the reception of the command on a carrier frequency different from the serving cell carrier frequency. A base station transmitter can jointly schedule a reference signal transmission from a plurality of base station transmitters for the purpose of OTD estimation enhancement, and transmit identical reference signals from the plurality of base station transmitters, the reference signals being identical both in the signal sequence and time-frequency resources used for transmission.
System and method of service discovery
A particular method includes generating, at a mobile station, a probe request frame and a service discovery request. At least a first portion of the service discovery request may be encapsulated within the probe request frame to form a modified probe request frame. The modified probe request frame may be wirelessly transmitted, for example, to a particular access point or to all access points with range of the mobile station.
Utilizing devices nearby
The present invention relates generally to network communications, and more particularly to detecting devices having communications issues on a network. The present invention provides for determining a communications performance status in relation to a device on a communications network experiencing a communications issue by identifying the device, locating reference devices in relation to the identified device, and determining where a performance deficiency may exist in relation to the identified device and the communications network.
Transmitter augmented radar/laser detection using local mobile network within a wide area network
A radar/laser emission detector is augmented with a cellular communications capability to provide the capability to share emission detection information amongst drivers to give other drivers even more advanced warning. A network of a plurality of cellular augmented radar/laser emission detector devices may be formed, each having the capability to source the location of radar or laser emission detections to others requesting access to such information, and each being warned when within a proximity of a recent radar or laser emission detection reported by at least one of the plurality of hybrid radar/laser detector devices. A local area, mobile area wireless network (MAWN) is formed in a cellular network to share radar/laser detection information among drivers. Mobile Position Centers (MPCs) are provided in ANSI-41 networks and Gateway Mobile Location Centers (GMLCs) (GSM networks), to determine other members that are proximate to a device that is detecting radar emission.
Technique for managing measurements for multiple subscriptions in a mobile terminal
A technique for managing measurements for at least two subscriptions in a mobile terminal is described. A method implementation of this technique performed in the mobile terminal comprises the steps of determining a common carrier set being an intersection between the first carrier set associated with a first subscription and the second carrier set associated with at least one second subscription, performing a first measurement on the first carrier set, and the second measurement on the second carrier set excluding the common carrier set, and mapping results associated with the first measurement of the first subscription relating to the common carrier set to the at least one second subscription.
Method and apparatus for transmitting and receiving feedback information in a mobile communication system
A method and apparatus for transmitting feedback information by a User Equipment (UE) in a mobile communication system are provided. The method includes receiving information about at least one Channel State Information Reference Signal (CSI-RS); performing channel estimation based on the information about at least one CSI-RS; receiving information about at least one feedback; and transmitting at least one feedback including a channel estimation result using the information about at least one feedback, wherein the information about at least one feedback includes information about a transmission timing and a feedback mode for at least one feedback.
System, apparatus, and method for dynamically customizing and configuring applications
A system and method for dynamically customizing and/or configuring applications on devices. The user interface of a base application resident on a terminal can be modified in accordance with the invention. Terminal-related information is transmitted from the terminal upon initial activation of the base application at the terminal. The terminal-related information is received at a configuration server system, where application variant information for the terminal is derived based on the terminal-related information. This application variant information is transmitted back to the terminal, and the user interface of the base application is modified as specified by the application variant information.
Method and system for republishing mobile content
A system and method is provided for republishing content for a wireless device. In the wireless device, this may comprise: receiving a content manifest associated with a new content, the content manifest providing information about the new content; identifying any changes to existing content stored in the device, based on the information in the content manifest; retrieving updates in the new content corresponding to the changes; and storing the updates.
Consumption and capture of media content sensed from remote perspectives
Embodiments of apparatus, packages, computer-implemented methods, systems, devices, and computer-readable media (transitory and non-transitory) are described herein for enabling a first mobile device to control a second mobile device, to enable media content sensed from a perspective of the second mobile device to be consumed using the first mobile device or captured by the second mobile device under control of the first mobile device. In various embodiments, control may include provision of one or more commands to the second mobile device using at least a persistent communication link between the first and second mobile devices. In various embodiments, control may further include receipt of at least a view of media content currently sensed by the second mobile device using a stateless communication protocol. In various embodiments, the first mobile device may control more than one remote mobile devices.
Electronic device including multiple SIM cards and method thereof
An operating method of an electronic device including at least two multiple Subscriber Identity Module (SIM) cards, includes receiving a call to a phone number assigned to a second SIM card during a call to a phone number assigned to a first SIM card among the multiple SIM cards, checking a call forwarding order fixed between the multiple SIM cards, and forwarding the call to the second SIM card phone number, to the first SIM card phone number according to the fixed order.
Systems and methods for terminating telephony communications to mobile telephony devices
Systems and methods for terminating telephony communications to a mobile telephony device that is roaming outside of its native service area make use of a forwarding termination service. The forwarding termination service causes the native mobile telephony service provider that provides service to the mobile telephony device to forward incoming telephony communications directed the native telephone number of the mobile telephony device to a forwarding access number. The forwarding termination service receives telephony communications directed to the forwarding access number, and then terminates the telephony communication to the mobile telephony device via any one of multiple different methods. The mobile telephony service provider can be instructed to implement and cancel call forwarding instructions by dialing a special character string on the mobile telephony device.
Systems and methods for terminating telephony communications to mobile telephony devices
Systems and methods for terminating telephony communications to a mobile telephony device via a data network make use of a forwarding termination service. The forwarding termination service causes a native mobile telephony service provider that provides service to the mobile telephony device to forward incoming telephony communications directed the native telephone number of the mobile telephony device to a forwarding access number. The forwarding termination service receives telephony communications directed to the forwarding access number, and then terminates the telephony communications to the mobile telephony device via any one of multiple different methods. The mobile telephony service provider can be instructed to implement and cancel call forwarding instructions by a forwarding agent that is separate from the forwarding termination service.
Mobile communication in a network-device environment
A system of provisioning contact information associated with one or more contacts of a communication device user may include a first processing device associated with a first service provider, a first computer-readable storage medium in communication with the first processing device and a second processing device associated with a second service provider and in communication with the first processing device. The first computer-readable storage medium may include instructions for receiving a mobile device identifier corresponding to a mobile device associated with a user of a second service provider, sending a message having an authorization code to the mobile device associated with the user, and receiving the mobile device identifier and the authorization code, receiving contact information associated with one or more contacts of an address book associated with the user, updating the received contact information and updating contact information associated with the user in one or more second address books.
System and method for providing notifications on a mobile device
A method is provided which comprises, upon detecting a particular event, determining that a notification is to be provided for the particular event; and activating a light source acting as a camera flash to provide the notification. The method may further comprise determining if an image capture application is currently active and only having the light source emit the camera flash as the notification if the image capture application is not currently active. The method may also comprise determining an orientation of the mobile device, determining if the image capture application is active, and only having the light source emit the camera flash as the notification if the orientation is indicative of visibility of the light source and if the image capture application is not currently active. The method may also comprise determining that the camera flash is to be modulated; and having the light source modulated.
SIM card authentication system and method
A SIM card authentication system and a SIM card authentication method adapted for a mobile phone are disclosed. Once the mobile phone is lost, when a SIM card is inserted into the mobile phone, the SIM card authentication system controls the mobile phone to display the user interface, the user must input the right authentication phone number to use the mobile phone. If the user inputs a wrong authentication phone number, the user is illegal and cannot use the mobile phone, the system acquires the phone number of the inserted SIM card to notify a legal user. Therefore, the mobile phone protects and hides stored information from the user, and the legal user may get back the mobile phone according to information from the inserted SIM card.
Authentication with secondary approver
Techniques are provided for giving access to restricted content on a first device from a second device through a wireless network. In one embodiment, the first device transmits an authorization request signal to the second device or to a server in the wireless network. The second device, having received the authorization request, prompts an authorized user to give authorization to the first device by inputting an authentication key such as a password or gesture on the second device. Upon verification of the authentication key, an authorization signal may be wirelessly transmitted to the first device, permitting access to the restricted content or functions on the first device. In some embodiments, the second device may be alerted to an authorization request and may select a request for authorization from a selectable queue of requests.
Method and apparatus for active defense and emergency response
A method and an apparatus comprise establishing a communications link with a mobile computing device. A user's intent to initiate a deterrent on an individual is recognized. An image capture device to capture at least one image in response to the user's intent to initiate a deterrent is activated. At least the image is transferred, via the communications link, to the mobile computing device in which the mobile computing device establishes a connection to at least an emergency unit and at least transmits the image and information regarding the user to the emergency unit. A releasing of the deterrent in response to the user's intent to initiate a deterrent is recognized. Broadcasting an audible alert in response to the user's intent to initiate a deterrent.
Systems, apparatus and methods for facilitating emergency call service in wireless communication systems
Systems and methods for facilitating emergency call service are provided. The method can include modifying a configuration parameter of a user equipment (UE), wherein the configuration parameter is related to at least one of: network selection, cell selection or reselection or service selection within a wireless communication system, and wherein a modified configuration parameter results in a preference by the UE for a network, cell or service configured to support emergency calls at the UE. The method can also include prioritizing circuit-switched services over packet-switched services, utilizing the circuit-switched voice service preferentially or exclusively and/or prioritizing a network configured to offer emergency call service over the original serving network of the UE, based, at least, on the modifying the configuration parameter. Modifying the configuration parameter can be performed autonomously by the UE. The modified configuration can also enable callback services to a UE from the network.
Dynamic biasing for an active circuit
A dynamic bias circuit for an active RF circuit includes an RF sensor coupled to the input port of the active RF circuit to sense the amplitude of the incoming RF signal. A control circuit is coupled to the RF sensor and a bias source. The bias signal to the active circuit is dynamically adjusted by summing the amplitude of the incoming RF signal with the nominal DC signal from the bias source. As the power in the incoming RF signal increase, so to does the bias signal to the active circuit, which allows the active RF circuit to increase its linear range of operation in the presence of stronger signals. The active circuit is designed such that its gain and phase behavior is nearly constant over large bias adaptation ranges without distortion when bias adjustments are dynamically made to the active circuit.
Increasing the robustness of channel estimates derived through sounding for WLAN
A plurality of training signal sets are transmitted. Each training signal set includes information sufficient to determine a channel estimate corresponding to a communication channel from a first station to a second station. A refined channel estimate is determined based on reception of the plurality of training signal sets.
Method and system for time division duplexing (TDD) in a 60 GHZ distributed communication system
Methods and systems for antenna switching for time division duplexing (TDD) in a 60 GHz distributed communication system are disclosed and may include enabling one or more antenna configurations in one or more remote RF modules within a wireless communication device based on a measured signal characteristic. The RF modules may receive IF signals generated from baseband signals via one or more coaxial lines. TDD RF signals may be communicated via the antenna configurations with devices external to the wireless communication device. The IF signals may be tapped in the coaxial lines at taps coupled to the RF modules. The baseband signals may include video, streamed Internet, and/or data from a local data source. The TDD RF signals may be transmitted to a display device. Control signals for the RF devices may be communicated utilizing the coaxial lines.
Multiple antenna processing on transmit for wireless local area networks
A method and an apparatus in a first wireless station of a network transmitting to a second wireless station. The network uses multi-tone OFDM signals. The first station includes multiple antennas and a receive and a transmit signal path per antenna. Each receive signal path includes a discrete Fourier transformer determining the tones in a received signal, and each transmit signal path includes an inverse discrete Fourier transformer converting tones to a signal. The method includes determining channel estimates for each tone and each receive path while receiving from the second station, determining transmit weights to transmit to the second station, tone-by-tone weighting a signal for transmission to the second station to produce weighted tone sets for each transmit signal path, and transmitting the weighted tone sets. The first station is configured so that the weighting produces additive beamforming without the second station needing multiple antennas.
Communication terminal having TDD switch with isolating function and driving method thereof
A communication terminal and a driving method thereof are provided. The driving method of a communication terminal includes: forming a transmitting path and an absorption path by controlling a time division duplex (TDD) switch in a transmitting mode to isolate the transmitting path and the receiving path from an absorption path, the transmitting path transmitting a transmitting signal in a wireless scheme, and the absorption path diverged from the transmitting path through a circulator of the TDD switch to block a reflecting signal in the transmitting signal reversely transferred to the transmitting path; processing the transmitting signal through the transmitting path. Because a TDD switch has an isolation function, insertion loss in a transmitting path may be suppressed.
Method and system for explicit feedback with sounding packet for wireless local area networks (WLAN)
Aspects of a method and system for explicit feedback with a sounding packet for wireless local area networks (WLAN). Aspects of the system may include a beamforming block that may enable generation of a plurality of RF chain signals based on a current steering matrix, where the current steering matrix may be a non-identity matrix. A processor may enable transmission of a request for feedback information via the plurality of RF chain signals. The request may contain medium access control (MAC) layer protocol data unit (PDU) data and channel sounding information, which may be encapsulated in a physical (PHY) layer PDU.
Method and apparatus for transmitting and receiving channel quality information in a wireless communication system
A method and apparatus for transmitting and receiving CQI in a wireless communication system are provided, in which when a UE transitions from a continuous reception state to a DRX state, CQI report resources are reallocated to the UE according to a CQI report resource reallocation rule agreed between the UE and an E-RAN, which obviates the need for signaling information about allocated new CQI report resources.
Method and system for characterizing a radio channel of a wireless network using variability of synchronization
A speed parameter or channel quality parameter are determined in a mobile device based on variation in frequency offset measurement. A higher variation in the frequency offset measurement reflects a poorer channel quality and a higher speed; a lower variation in the frequency offset measurement reflects a better channel quality and a lower speed. The parameter(s) may be fed back to the system and used, for example, to make adaptive modulation and coding decisions.
Configurable shielded enclosure with signal transfer element
An enclosure that has an interior space sized to receive a portable electronic device. The enclosure has a shielding layer that can shield and prevent communications between the interior space and the outside world in a first configuration. In a second configuration, communication is allowed. A signal transfer element is attached to the enclosure housing that can be moved between an isolation configuration and a communication configuration.
Method and system for identification and mitigation of errors in non-line-of-sight distance estimation
Ultra-wide bandwidth (UWB) transmission is a promising technology for indoor localization due to its fine delay resolution and obstacle-penetration capabilities. However, the presence of walls and other obstacles present a significant challenge in terms of localization, as they result in positively biased distance estimates. Measurement campaigns with FCC-compliant UWB radios can quantify effects of non-line-of-sight (NLOS) propagation. Features of waveforms measured during a campaign can be extracted for use in distinguishing between NLOS and line-of-sight situations in embodiments of the present invention. Embodiments further include classification and regression methods based on machine learning that improve the localization performance while relying solely on the received signal. Applications for systems employing an example embodiment of the invention include indoor or outdoor search and recovery with high accuracy and low cost.
Portable wireless terminal, wireless terminal, wireless communication system, and wireless communication method
Disclosed is a wireless terminal for performing independent distributed-type wireless communication with a portable wireless terminal. The wireless terminal is provided with: a channel setting section for setting a channel on which wireless communication with the portable wireless terminal is performed; a trigger receiving section for receiving a trigger; a free channel search section for searching for a free channel in response to the trigger received, and for delivering a signal, which changes the set channel in accordance with the search result, to the channel setting section; and a transmission section for transmitting to the portable wireless terminal a signal which reports the change.
Apparatus and method to enable device-to-device (D2D) communication in cellular networks
An apparatus and method of allowing user equipment to transmit information directly with other user equipment, using a device-to-device mode is disclosed herein. A device-to-device blank subregion is defined where device-to-device information can be transmitted without interference from other user equipment. The device-to-device blank subregion may be set up such that it is only used in an exclusive mode if a device-to-device cluster is considered highly interfering. A device may join a device-to-device network through the use of a beacon transmission interval, a control transmission interval, and a data transmission interval.
Distributed channel selection for wireless networks
Wireless networking devices scan for available channels and gather data about the channels and the RF environment. Using this information, each wireless networking device determines a cost value for each available channel and a quality value for its overall RF neighborhood. Each wireless networking device select the channel with the best cost value as a candidate channel for use. The wireless networking devices may submit channel requests to the arbiter for approval. If two or more wireless networking devices are requesting the same channel, the arbiter assigns the channel to the wireless networking device with the worst RF neighborhood quality. The arbiter informs the wireless networking devices if their channel requests are approved. If a wireless networking device's channel request is not approved, the wireless networking device will rescan the remaining available channels to select a different candidate channel to be approved.
Mobile wireless communications device providing Bluetooth switchover features based upon near field communication (NFC)
A mobile wireless communications device may include a near field communication (NFC) transceiver, a Bluetooth transceiver, and a controller coupled with the NFC transceiver and the Bluetooth transceiver. The controller may be configured to communicate with a first Bluetooth device via the Bluetooth transceiver using at least one Bluetooth profile supported by the first Bluetooth device, communicate with a second Bluetooth device via the NFC transceiver and determine if the at least one Bluetooth profile is also supported by the second Bluetooth device, and when the at least one Bluetooth profile is also supported by the second Bluetooth device, cease using the at least one Bluetooth profile with the first Bluetooth device and begin using the at least one Bluetooth profile with the second Bluetooth device.
Method and system for improving client server transmission over fading channel with wireless location and authentication technology via electromagnetic radiation
Wireless personal area network (Zigbee, Bluetooth, UWB) and wireless identification technologies (Near Field Communication (NFC), Radio Frequency Identification (RFID)) are implemented in particular client server functions and communications. Connected with an Authentication Server, a wireless HUB authenticates user identification and provides the user with access to secure data communication with a wireless terminal such as a cellular phone or a PDA. A Location Server provides user locations via methods such as RSSI, TDOA, and GPS and sends location information to a Center Control Server and the Authentication Server. With location information, the Center Control Server initiates and optimizes secure information processes and coordinates the functions of servers and user terminals.
Method, apparatus, and use of presence detection to control a function of a device requiring a pairing security level
The system and method provide for a small, low-power device, e.g., a Bluetooth® device, in a carryable or wearable form, that allows a controlled device to respond to the presence of the user. The device may be worn on one's person and allow other devices, by means of Bluetooth® pairing and protocols, to detect the presence of a user. The controller or controlling device may emit a signal in the vicinity of the user to allow the controlled device to know whether or not the controlling device is present, and the signal may be a pulse of data that is transmitted every few seconds. The pulse of data between the transmitter and the receiver may be encrypted to be used for higher-security applications as a means of dual-factor authentication. The presence of the user may be employed to control a device, e.g., to control access to a computer, to unlock/lock doors, to turn lights on and off, and so on.
Two-factor user authentication using near field communication
A user is authenticated to a mobile computing device using an NFC tag. The NFC tag may be initially associated when an NFC reader of the device senses the NFC tag and wirelessly retrieves a tag identifier from the tag. The tag identifier is stored for subsequent retrieval. The authentication process begins after receiving a valid password and then positioning the device proximate the object such that the NFC reader of the device retrieves the tag identifier from the NFC tag without receiving input at the mobile computing device. In the event that the retrieved tag identifier matches the stored tag identifier, the mobile computing device is unlocked and the user may access the mobile computing device. If the retrieved tag identifier does not match the stored tag identifier, the user is not authenticated and the mobile computing device remains locked.
Methods for a radio-frequency SIM card with low-frequency magnetic communication to trigger a transaction according to determined distance thresholds
A method for a radio-frequency SIM card with low-frequency magnetic communication to trigger a transaction according to determined distance thresholds comprises: setting a Threshold 1 as a low-frequency magnetic field intensity value corresponding to a distance to trigger the transaction; setting a Threshold 2 as a low-frequency magnetic field intensity value corresponding to an effective communication distance of the low-frequency magnetic field; setting a Threshold 3 as a low-frequency magnetic field intensity value corresponding to a farthest transaction distance; examining an intensity of the low-frequency magnetic field transmitted by a card reader and determining whether the intensity is >=the Threshold 2; if yes, receiving and storing information of the low-frequency magnetic field; further determining whether a low-frequency magnetic field intensity is >=the Threshold 1; if yes, initiating a transaction process; during the transaction process, determining whether a low-frequency magnetic field intensity is < the Threshold 3; if yes, interrupting the transaction.
Near field communications-based soft subscriber identity module
Using Near Field Communications (NFC) to provision a User Equipment (UE) with Subscriber Identity Module (SIM) data for accessing a wireless services provider's network. An NFC gesture initiates an NFC link between an NFC device and a UE containing NFC circuitry. The NFC link is used to transmit SIM data stored in a memory of the NFC device to the UE. The SIM data is received by the UE and stored in a memory of a SIM module in the UE. Thereafter, the SIM data is used to access the wireless network and obtain communication services therefrom.
Mobile terminal and control method thereof
A mobile terminal includes: a display; a short-range communication module; and a controller configured to establish a communication link with at least one first terminal located within a predetermined distance by using the short-range communication module, obtain second information associated with first information when the first information is obtained through the established communication link, and display the same on the display. Based on information obtained through a short-range communication link, information associated with the obtained information is obtained, thereby providing various services by using short-range communication.
Antenna structure for a near-field communication device
A near field communication (NFC) communicator includes a housing, an NFC controller and an antenna circuit located in the housing. The antenna circuit enable inductive coupling of a near field electromagnetic signal with another antenna circuit in near field range. The antenna circuit includes an antenna element to generate the electromagnetic signal. The communicator also includes a receiver circuit located in the housing for extracting data from modulation induced in the electromagnetic signal which is caused by the inductive coupling of the near field electromagnetic signal with another antenna circuit, a transmitter circuit to generate the near field, a load modulator to modulate the near field to the reader and an energy harvesting circuit to power the rest of the circuit from the external field. A ferrite sheet is located in the housing such that a gap is maintained between the antenna element and the ferrite sheet.
Multi-mode wideband antenna
Methods and systems for extending a bandwidth of a multi-mode wideband antenna of a user device are described. A multi-mode wideband antenna includes a single radio frequency (RF) feed coupled to a first element, and a second element coupled to the first element and a ground plane. The first element is to operate as a feeding structure to a parasitic grounding element that is coupled to the ground plane, but is not conductively connected to the RF feed. The multi-mode wideband antenna is configured to provide multiple resonant modes.
Method and system for utilizing out of band signaling for calibration and configuration of a mesh network of EHF transceivers/repeaters
A plurality of repeater devices, each of which may enable forwarding extreme high frequency (EHF) communication between EHF-enabled wireless devices, may form a repeater mesh network. Some or all of the plurality of repeater devices may utilize non-extremely high frequency (non-EHF) control connection in communicating with other repeater devices in the repeater mesh network. The non-EHF control connections may be utilized in establishing, configuring, and/or managing the repeater mesh network. The non-EHF control connections may be also be utilized to enable sending, requesting, and/or receiving periodic and/or dynamic control information. The non-EHF control connections may also be utilized while forming, and/or managing forwarding routes of EHF communication via the repeater mesh network, to enable negotiating and/or setting different isolation techniques among the repeater devices, such as polarization isolation, spatial isolation, and/or use of different frequencies.
Repeater system for extended cell coverage
A repeater system for extending cell coverage, including a frequency band translation repeater for transmitting radio frequency (RF) signals to and receiving RF signals from a base station and translating between the frequency band of THE RF signals and a different frequency band for RF transmission directly between the repeater and user equipment.
Adaptable audio instruction system and method
An adaptable audio instruction system and method allows for tailoring and modification to audio sequences used for audio instruction of users. The tailoring and modification abilities of the system regard content and presentation details of the audio sequences to comply with user preferences and user progress in learning content contained in the audio sequences.
Sliding member for fixing device, fixing device, and image forming apparatus
Provided is a sliding member for a fixing device including in order a first fluororesin layer having a sliding surface dotted with recessed portions, a substrate, and a second fluororesin layer.
Image forming apparatus
An image forming apparatus includes a fixing unit and an apparatus main body. The fixing unit includes a first rotating member, a second rotating member and a fixing nip forming mechanism. The first rotating member is heated by a heating source. The second rotating member faces to the first rotating member. The fixing nip forming mechanism makes the second rotating member pressed to the first rotating member and forms a fixing nip between the first rotating member and second rotating member. To the apparatus main body, the fixing unit is attachably/detachably installed. The apparatus main body includes a nip pressure changing mechanism. The nip pressure changing mechanism presses the fixing nip forming mechanism and changes a pressure of the fixing nip.
Fixing device and image forming apparatus
A fixing device includes an endless belt that fixes toner onto a recording medium by heat, a heating member in the form of substantially a sheet that has flexibility and that heats the belt from inside a space enclosed by the belt, and a stationary member including a curved surface that is in contact with the heating member, a fixed area in the curved surface in which the heating member is fixed to the stationary member, and a non-fixed area in the curved surface in which the heating member is not fixed to the stationary member, the stationary member having a coefficient of linear expansion different from that of the heating member. The belt is wound around the stationary member via a layer that includes the heating member, and rigidities of the belt and the heating member are lower than a rigidity of the stationary member.
Image heating apparatus regulating a shift movement of an endless belt the inner face of which contacts a nip portion forming unit forming a nip portion with a roller contacting an outer face of the belt
The image heating apparatus includes an endless belt, a roller which contacts an outer face of the belt, and a nip portion forming unit which contacts an inner face of the belt, and forms a nip portion with the roller, for nipping and conveying a recording material. The nip portion forming unit includes a component which is longer than the belt in a generatrix direction of the belt. The apparatus also includes a regulation portion provided to oppose an end face of the belt, for regulating a shift movement of the belt to the generatrix direction of the belt. The regulation portion is integrally-molded with the component. As a result, damage of the end of the endless belt can be reduced.
Fixing unit, image forming apparatus including the same, and method for separating recording medium
A fixing unit includes a heating member, a pressing member, a casing, a separating member, and an urging member. The separating member has a separation claw and a rotating unit. The urging member urges the separation claw toward the surface of the heating member. The rotating unit has an engaging portion and guide surfaces opposing at an interval smaller than that of the engaging portion. The supporting portion includes an engagement supporting portion that rotatably engages the engaging portion and an insertion opening. The separating member rotates to retract guide surfaces from a position facing the inner wall surfaces of the insertion opening. The guide surfaces oppose the inner wall surfaces of the insertion opening to bring the engaging portion to the engagement supporting portion and thereafter mounting the heating member on the casing.
Image forming apparatus including developing device using toner holding member with specific surface roughness
A developing device including a toner holding member that faces but is not in contact with an image carrier carrying a latent image and that rotates while holding a nonmagnetic toner, a charging member that charges the toner, and a developing electric field forming unit that forms a developing electric field at least including a direct current component to cause the charged toner to fly and adhere to the latent image to develop the latent image. When the developing electric field is applied such that the toner is caused to fly toward the image carrier by the direct current component of the developing electric field, maintaining a non-electrostatic adhesion of the toner to the toner holding member to be about 2 nN or more under a low-temperature low-humidity environment of a temperature of 10° C. and a relative humidity of 15%. The toner holding member's surface has a specific surface roughness specified by a specific oil retention volume.
Developing device and process unit and image forming apparatus incorporating same
A developing device includes a toner bearer including a surface in which multiple recesses having a cross-sectional void rate of 50% or smaller are formed, a toner supply member to supply toner to the toner bearer, and a developer regulator disposed facing or in contact with the toner bearer and including a bent tip portion. The toner bearer has a surface roughness Ra within a range from 1.0 μm to 2.0 μm, and a surface area ratio within a range from 2.0 to 4.0. The developing device uses polymerized toner having a weight average particle diameter of 8.0 μm or smaller and an average circularity of 0.98 or greater.
Developing device and image forming apparatus
The present application discloses a developing device including a housing having a connection surface to which the container connects. The connection surface is provided with a feed port for feeding the developer. The developing device includes a shutter mechanism configured to selectively open and close the feed port. The shutter mechanism includes a shutter piece, which moves between a closing position for closing the feed port and an opening position for opening the feed port, and a squeezing mechanism, which protrudes from the shutter piece situated in the closing position to squeeze the developer into the housing through the feed port.
Image forming apparatus providing a controlled deliver of developer after startup
An image forming apparatus includes an image bearing member that bears an electrostatic latent image; a developer container containing developer; a developing unit that develops the electrostatic latent image on the image bearing member with the developer; a tubular transport-path forming member that forms a transport path through which the developer is transported from the developer container to the developing unit; a transport member that is disposed inside the transport-path forming member and transports the developer from the developer container to the developing unit; and a control unit that performs control such that, when the transport-path forming member is used for the first time or when the developer container is replaced, an operation to fill the developer into the transport-path forming member is performed by driving the transport member after the image forming operation is started.
Toner cartridge packaging
A toner cartridge packaging having a non-planar top surface is disclosed.
Image forming apparatus
An image forming apparatus includes an image bearing member, a conductive member, a bias application device, and a control portion. The image bearing member has a photosensitive layer formed on an outer peripheral surface thereof. The conductive member is disposed so as to make contact with an inner peripheral surface of the image bearing member and has a dielectric property. The bias application device applies a bias including an alternating current bias to the conductive member. The control portion controls the bias application device. The image forming apparatus is capable of executing a heating-up mode in which an alternating current bias having a peak-to-peak value twice or more as large as a discharge start voltage between the conductive member and the image bearing member is applied to the conductive member to cause the surface of the image bearing member to be heated up.
Image forming apparatus with control section to control contact pressure between heating member and pressure member and control method thereof
An image forming apparatus is provided that includes: a heating member that heats a recording sheet; a pressure member that presses the recording sheet between the heating member and the pressure member; an adjustment mechanism that causes the heating member and the pressure member to contact or to separate; and a control section that, at a time of a warm-up operation or an idling operation, based on a predetermined condition, controls the adjustment mechanism so as to cause the heating member and the pressure member to contact at a contact pressure that is lower than a contact pressure between the heating member and the pressure member at a time of image formation or is approximately identical to the contact pressure at a time of image formation.
Developing device and image forming apparatus
A developing device which includes a developing roller which supplies a toner to a photoreceptor and a supply roller which performs supply of a toner to the developing roller and peeling of a toner from the developing roller, and applies a bias voltage to the developing roller so as to develop an electrostatic latent image formed on the photoreceptor with a toner. The developing device includes a first current measuring portion which measures a value of a current flowing in the developing roller, a second current measuring portion which measures a value of a current flowing in the supply roller, and a control portion which calculates a toner charging amount on the developing roller and a toner peeled amount by the supply roller based on measured results by the first current measuring portion and the second current measuring portion.
Image forming apparatus including anomaly detection for charging members
An image forming apparatus comprises a plurality of photoconductors, a plurality of chargers including charging members, a voltage application unit to which charging members are connected in parallel and which is configured to apply a voltage to the charging members, a controller, and a messaging unit. The controller is configured to change, upon startup, the voltage to be applied by the voltage application unit to the charging members from a previously applied first voltage to a second voltage of which an absolute value is smaller than that of the first voltage, to obtain amounts of electric currents caused to flow through the respective charging members by application of the second voltage. A determination as to whether any anomaly is present is made based upon the obtained amounts of electric currents for the charging members. The messaging unit is configured to produce a notification about presence or absence of anomaly.
Developing apparatus and image forming apparatus
A developing apparatus includes a development unit configured to supply toner to a photoconductor on which an electrostatic image is formed, a supply unit configured to supply toner to the development unit, a sensor configured to detect a concentration of toner in the development unit, and a control unit. The control unit is configured to, when the detected concentration of the toner is lower than a first value, control the supply unit to perform a toner supply process, control the sensor to detect the concentration of the toner after the toner supply process, count the number of times the sensor detects the concentration of the toner to be higher than a second value that is higher than the first value, and control the supply unit to repeat the toner supply process, when the counted number is less than a predetermined number that is equal to or greater than two.
Wavelength-selectable laser device and apparatus and system including same
A wavelength-selectable laser device generally includes an array of laser emitters and a filtered external cavity for filtering light emitted from the laser emitters and reflecting different wavelengths back to each of the laser emitters such that lasing occurs at different wavelengths for each of the laser emitters. Each laser emitter includes a gain region that emits light across a plurality of wavelengths including, for example, channel wavelengths in an optical communication system. The filtered external cavity may include a dispersive optical element that receives the light from each of the laser emitters at different angles and passes or reflects different wavelengths of the light at different angles such that only wavelengths associated with the respective laser emitters are reflected back to the respective laser emitters. By selectively emitting light from one or more of the laser emitters, one or more channel wavelengths may be selected for lasing and transmission.
Method and system for non-linearity compensation in optical transmission systems
An equalizer (200) for equalization of a signal transmitted via an optical fiber link from a transmitter to a corresponding receiver employs a backpropagation model (300) which comprises one or more sequential segments collectively representing an inverse fiber link. Each sequential segment comprises a linear backpropagation element (304), and a non-linear backpropagation element (306) having an associated compensation bandwidth (312). The equalizer (200) generates a distortion-mitigated signal by computing, for each sequential segment in turn, a first linear compensated signal from a signal input to the segment in accordance with the linear backpropagation element (304), and a non-linear compensated signal from the first linear compensated signal in accordance with the non-linear backpropagation element (306). Computation of the non-linear compensation signal comprises limiting a bandwidth of a compensation signal derived from the first linear compensated signal in accordance with the associated compensation bandwidth (312).
Optical transceiver system
An optical transceiver system includes a transmitter emitting a first light beam having a first wavelength, a receiver receiving a second light beam having a second wavelength; an optical fiber transmitting the first light beam and the second light beam; and a light guide member. The light guide member includes a lens block having a bottom surface facing toward both the transmitter and the receiver, a first side surface slanted relative to the bottom surface, and a second side surface facing toward the optical fiber, a first lens and a second lens formed on the bottom surface for optically coupled with the respective transmitter and receiver, a third lens formed on the second side surface for optically coupled with the optical fiber, and a light guide portion embedded in the lens block.
Photonic radio frequency front end receiver
A compact photonic radio frequency front end receiver system including a laser chip source, radio frequency and LO inputs, an optical modulator chip coupled to the laser source and the radio frequency and LO inputs, a millimeter scale optical radio frequency multi-pole filter coupled to the optical modulator, an optical switch array chip coupled to the optical radio frequency multi-pole filter, and a detector chip coupled to the optical switch array, all with micro-optic coupling, heterodyne signal recovery, and wavelength locking.
System for long reach xDSL over fiber
System for connecting a plurality of digital subscribers to a data network, comprising a local part connected, by an optical fiber link, to a remote part. Said local part comprises a plurality of DSLAM line cards with xDSL over fiber transceiver that, in turn, comprise a plurality of xDSL lines comprising a modified analog front end which comprises an digital-analog converter to transform a transmitted digital downstream signal into an analog downstream signal; an oscillator which fixes an oscillation frequency for the xDSL line; a mixer, directly connected to the output to convert the analog downstream signal into the oscillation frequency; and a band pass filter centered at the oscillation frequency which filters the converted analog downstream signal. And in upstream direction: a band pass filter centered at the oscillation frequency which filters an analog upstream signal; an oscillator which fixes an oscillation frequency for the xDSL line; a mixer, directly connected to the output of the band pass filter to convert the analog downstream signal into the original frequency; a low pass filter to avoid aliasing; an analog front end which comprises an analog-digital converter to transform the converted analog upstream signal into a digital upstream signal.
Method and system for reducing the resource utilization of switch fabric in a SONET/SDH multiplexer by switching data on a TU level
The present invention relates to a method and apparatus for reducing the resource utilization of the switching fabric in a SONET/SDH multiplexer by switching data on a TU level instead of byte or column level.
Solution for hitless protection in high-speed OTN framer and front-end
In an optical communication system containing a primary line and backup line card, a method includes providing interfaces for the primary and backup line card, each line card including a transmitter and receiver; and selecting output from the transmitter from either the primary or back up line card including selecting the backup line card when the primary line card encounters a failure.
Camera, lens unit, and image-pickup system
A camera communication unit is configured to change a voltage applied to a communication terminal used for a communication with the lens unit. The camera communication unit is configured to communicate with the lens unit using one of a first communication mode and a second communication mode, the first communication mode setting the voltage applied to the communication terminal to a first range and enabling the communication with the lens unit using a communication method of a first communication speed, and the second communication mode setting the voltage applied to the communication terminal to a second range that is located on a lower voltage side than the first range and enabling the communication with the lens unit using a communication method of a second communication speed higher than the first communication speed.
Optical anti-shake driving structure
An optical anti-shake driving structure includes a base, a sliding platform, a driving device and a limiting device. At least two guide rods are set on the base, the guide rod is set on the same plane as the base. The sliding platform suspended on the guide rods and having a lens set within a hole on the sliding platform, the lens aligned with a light transmissive hole of the base. The driving device set on the base to drive the sliding platform, the limiting device set on the base to limit the displacement range of the sliding platform. The components of the driving structure are simplified, of a greatly reduced thickness, are easy to assembly, as well as lowering cumulative tolerances.
Multi-drive mechanism lens actuator
Subject matter disclosed herein may relate to lens actuators used, for example, in auto-focus and/or vibration compensation systems of digital cameras.
Automated super heated steam generators
Modularized, superheated steam generators comprise a steam module (46), a thermocouple module (41), and an electrode module (45) assembled within a containment enclosure (66). The multi-stage steam module (46) comprises a plurality of first stage pressure vessels (77) surrounding and feeding a second stage pressure vessel (78). The steam module (46) is coaxially surrounded by insulation (48) disposed within a cylindrical shroud (72). The electrode module (45) radiantly heats the steam module with resistive heating elements (119). The thermocouple module (41) includes thermocouples monitoring first stage temperatures within and between pressure vessels (77). PLC computer SCADA software (600) operates the generators. Thermocouple data is analyzed to control heater temperatures, the water feeding system (340), and outputted steam temperature. PLC software (600) provides operating logic (602) establishing a start up subroutine (602), a ramp up subroutine (603), a steady state subroutine (605), and a shut down subroutine (606).
Randomly accessible visual information recording medium and recording method, and reproducing device and reproducing method
Access point pictures designated as randomly accessible positions are I pictures or P pictures. Information indicating the decoding sequence (I1, P1, B1, B2, B3, B4, P2, . . . ) of pictures functioning as access points and attribute information (picture_type) indicating whether a picture functions as an access point or is necessary for decoding of the access point following a given access point are recorded on the video information recording medium. Random access is possible even if the GOP interval is lengthened.
Use of near field communication (NFC) to transfer DVR timers
A mobile device running a mobile application accesses a remote content receiver to request the remote content receiver to retrieve a particular recording timer, and upon receiving the recording timer from the remote content receiver, establishes a radio communication link with a second mobile device and transfers the recording timer to the second mobile device over the established radio communication link. The radio communication link is preferably the Near Field Communication (NFC) link.
Systems and methods for semantic editorial control and video/audio editing
A media content management application that allows a user to create and customize a version of media content based on semantic criteria is provided. Based on semantic criteria, the media content management application may use editing/assembly software packages to construct a version of the media content for an intended audience. In addition, the media content management application uses semantic criteria to provide the user with options for optimizing the cost of the version of media content, options for delivering the version of media content, and/or options for delivery mediums to transmit the version of media content.
Media generating system and method
A media generation system and method are provided that automatically directs one or more users to perform in one or more shots specified in the marked-up script and automatically combines the one or more shots into a piece of media.
Semantic zoom for related content
Among other things, one or more techniques and/or systems are provided for displaying a related content view within a search interface. That is, a search interface, such as a search application, may provide search results that are relevant to a query submitted through the search interface. For example, a main search engine results view comprising one or more search results of the query may be presented within the search interface. Responsive to a semantic zoom operation (e.g., a touch gesture), the search interface may be transitioned from the main search engine results view to a related content view comprising related content that corresponds to the query and/or a (e.g., supplemental) search result for the query. In this way, the user may explore supplemental content, such as query suggestions, images, entity descriptions/profiles, videos, and/or other content, that may be related to a query submitted by the user.
Optical fiber fixing device
An optical fiber fixing device includes a substrate, a cover, a locking assembly, and a fixing plate. The substrate has a loading surface. A number of poles are positioned on the loading surface. Every two adjacent poles cooperate to form a receiving groove. The cover is rotatably connected to one end of the substrate. The fixing plate is positioned on the cover, and has a main body and a number of abutting portions extending from the main body. The abutting portions are corresponding to the receiving grooves respectively. Each abutting portion has two opposite abutting surfaces inclined with respect to the loading surface. Each abutting surface faces one of the poles, and thus the two abutting surface of each abutting portion cooperate with two corresponding poles and the loading surface to fix two optical fibers in the corresponding receiving groove.
Vertically curved waveguide
An optical waveguide structure may include an optical waveguide structure located within a semiconductor structure and an optical coupler. The optical coupler may include a metallic structure located within an electrical interconnection region of the semiconductor structure, whereby the metallic structure extends downward in a substantially curved shape from a top surface of the electrical interconnection region and couples to the optical waveguide structure. The optical coupler may further include an optical signal guiding region bounded within the metallic structure, whereby the optical coupler receives an optical signal from the top surface and couples the optical signal to the optical waveguide structure such that the optical signal propagation is substantially vertical at the top surface and substantially horizontal at the optical waveguide structure.
Semiconductor through-wafer electrical signal-carrying virtual waveguide
A through-wafer electrical signal communication apparatus and method utilize a semiconductor substrate having first and surfaces and a continuous peripheral edge. The first surface supports active integrated circuit components. An electromagnetic waveguide supports data communication through the semiconductor substrate. The waveguide has an electrically conductive waveguide boundary structure surrounding a waveguide interior region formed by a portion of the semiconductor substrate. The waveguide is sized and configured to propagate electromagnetic waves of selected wavelength and propagation mode from a first waveguide end to a second waveguide end. A signal launching structure radiates electromagnetic waves into the first waveguide end. A signal pickup structure receives electromagnetic waves from the second waveguide end. The apparatus and method may utilize one or more of the waveguides. The waveguides may include a real waveguide, one or more virtual waveguide formed using light energy, and/or a hybrid waveguide comprising real and virtual waveguide structures.
Optical fiber cable net and method for producing the same
The present invention relates to an optical fiber cable net including: one elongated optical fiber cable having a front end portion repeatedly moved upward and downward from the lower end portion of the left side of a bee hive-like section along a line forming the bee hive-like section, the optical fiber cable being wound by a plurality of times onto pre-disposed portions where it meets the pre-disposed portions and being moved upward or downward, so that if the front end portion of the optical fiber cable reaches the lower end portion of the right side of the bee hive-like section, the front end portion of the optical fiber cable is sequentially passed through the respective net eyes of the right side of the bee hive-like section, the respective net eyes of the upper side thereof and the respective net eyes of the left side thereof.
Optical sensing system and method
An optical sensing system includes a transmitter assembly for generating a generated signal having a frequency in an optical wavelength. An optical sensing fiber is coupled to the transmitter assembly for receiving the generated signal and producing a reflected signal from backscattering of the generated signal. The system also includes a receiver assembly coupled to the optical sensing fiber for receiving the reflected signal. The system further includes a controller in communication with the receiver assembly for determining environmental effects imposed on the optical sensing fiber based on characteristics of the reflected signal.
Optical frequency comb generating device and optical pulse generating device using same, and optical frequency comb generating method and optical pulse generating method using same
The optical frequency comb generating device having two optical modulation parts 41 and 42 independently modulating optical waves propagating in two branch waveguides and a phase regulator 43 controlling a phase difference between the optical waves includes amplitude adjusting means 22 for adjusting a voltage amplitude of the RF signal supplied to at least one of the optical modulation parts, monitoring means 21 for monitoring the intensity Pout of the output light beam, and a bias control circuit 20 that controls the amplitude adjusting means to change a difference in voltage amplitude between the RF signals supplied to each optical modulation part, that detects a variation of the output light beam corresponding to the variation of the difference in voltage amplitude from the output signal of the monitoring means, and that controls the phase regulator on the basis of the detection result to adjust the phase difference.
A downsized, low-power electro-optical modulator that achieves reducing both of the additional resistance in the modulation portion and the optical loss each caused by electrodes at the same time is provided. The electro-optical modulator includes a rib waveguide formed by stacking a second semiconductor layer 9 having a different conductivity type from a first semiconductor layer 8 on the first semiconductor layer 8 via a dielectric film 11, and the semiconductor layers 8 and 9 are connectable to an external terminal via highly-doped portions 4 and 10, respectively. In a region in the vicinity of contact surfaces of the semiconductor layers 8 and 9 with the dielectric film 11, a free carrier is accumulated, removed, or inverted by an electrical signal from the external terminal, and whereby a concentration of the free carrier in an electric field region of an optical signal is modulated, so that a phase of the optical signal can be modulated. At least one of the semiconductor layers 8 and 9 is wider than the stacked portion. At least one of the highly-doped portions 4 and 10 is formed outside the stacked portion.
Dynamic sizing and positioning of multiple images
A system of arranging images provides for automated scaling, positioning and organizing of a plurality of images on an image display, which may be transferred to a printed or electronic product design. A plurality of images are analyzed to produce image data. Display parameters determine permissible arrangement of the images. Based on the image data and the display parameters, an arrangement on the image display for each of the plurality of images is defined. The arrangement may be further defined to maximize at least one dimension of the images.
Multi-scale image normalization and enhancement
An image may be processed to normalize and/or remove noise from the image. The processing of the image may involve decomposition of the image into multiple components and subsequent gray scale registration across multiple scales.
Method and device for reducing temporal noise for image
A temporal noise reduction method and a temporal noise reduction device are provided. The temporal noise reduction device includes a temporal filter unit that performs a temporal filtering operation using pixel values (CP) of an N×M array in a current frame and pixel values (FP) of an N×M array located at the same position in a neighboring frame separated by a distance TP from the current frame and a motion filter unit that detects a motion of a pixel image from the resultant values of the temporal filter unit and that eliminates noise of a motion-abundant pixel value using a spatial filter. It is possible to effectively reduce noise of an image to prevent deterioration in image quality of the image and to improve performance of post-processing techniques.
Image processing apparatus, integrated circuit, program, imaging apparatus, and display apparatus
An image processing apparatus separates a captured image into a region of object (B) 1001B and a region of object (A) 1001A shallower than the region of object (B) 1001B in depth indicated by depth information, duplicates pixels constituting the region of object (B) 1001B and positioned in neighborhood of boundary between the region of object (B) 1001B and the region of object (A) 1001A, onto the neighborhood of the boundary outside the region of object (B) 1001B, thereby generating an extended region (B) 5001B, performs blur processing on the extended region (B) 5001B and the region of object (A) 1001A based on the depth of the region of object (A) 1001A indicated by the depth information, and after the processing, composites a value of each pixel constituting the extended region (B) 5001B and a value of one of pixels constituting the region of object (A) 1001A corresponding in position.
Image dynamic range compression system, method and program
There is provided an image dynamic range compression system which can compress a dynamic range for which the visibility of a low-frequency image is ensured while preserving a high-frequency image. An image converting unit converts an input image into a compressed image having a narrower dynamic range than the input image. A high-frequency image extracting unit extracts a high-frequency image from the input image. An image synthesizing unit synthesizes a compressed image and the high-frequency image. Further, by adaptively changing synthesizing method of ensuring the visibility of images to synthesize, the image synthesizing unit synthesizes these images.
System and method for improving decoder performance using quantization control
A codec includes an encoder having a quantization level generator that defines a quantization level specific to a block of values (e.g., transform coefficients), a quantizer that quantizes the block of transform coefficients according to the block-specific quantization level, a run-length encoder, and an entropy encoder. The quantization level is defined to result in at least a predetermined number (k) of quantized coefficients having a predetermined value. The amount of data compression by the encoder is proportional to (k). The codec also includes a decoder having entropy and run-length decoding sections whose throughputs are proportional to (k). The decoder takes advantage of this increased throughput by further decoding coefficients in parallel using a plurality of decoding channels. Methods for encoding and decoding data are also disclosed. The invention is well-suited to quantization, entropy, and/or run-length-based codecs, such as JPEG.
Interactive image selection method
A method for browsing a collection of digital images on a soft-copy display comprising: receiving a collection of digital images; interactively user selecting a digital image using a user interface; determining a plurality of subsets of the digital images, wherein each subset shares a common category with the selected digital image; and displaying the subsets of digital images on the soft-copy display, together with the selected digital image.