­
­
­
­

Inventi Impact - Algorithm

Patent Watch

  • Multi-state EEPROM having write-verify control circuit

    An EEPROM having a memory cell array in which electrically programmable memory cells are arranged in a matrix and each of the memory cells has three storage states, includes a plurality of data circuits for temporarily storing data for controlling write operation states of the plurality of memory cells, a write circuit for performing a write operation in accordance with the contents of the data circuits respectively corresponding to the memory cells, a write verify circuit for confirming states of the memory cells set upon the write operation, and a data updating circuit for updating the contents of the data circuits such that a rewrite operation is performed to only a memory cell, in which data is not sufficiently written, on the basis of the contents of the data circuits and the states of the memory cells set upon the write operation. A write operation, a write verify operation, and a data circuit content updating operation based on the contents of the data circuits are repeatedly performed until the memory cells are set in predetermined written states.

  • Network port profiling

    A port profiling system detects unauthorized network usage. The port profiling system analyzes network communications to determine the service ports being used. The system collects flow data from packet headers between two hosts or Internet Protocol (IP) addresses. The collected flow data is analyzed to determine the associated network service provided. A host data structure is maintained containing a profile of the network services normally associated with the host. If the observed network service is not one of the normal network services performed as defined by the port profile for that host, an alarm signal is generated and action can be taken based upon the detection of an Out of Profile network service. An Out of Profile operation can indicate the operation of a Trojan Horse program on the host, or the existence of a non-approved network application that has been installed.

  • Removing malicious code in media

    A method may include receiving untrusted digital media; converting the untrusted digital media into an analog signal;converting the analog signal into trusted digital media; and storing the trusted digital media.

  • Television broadcast receiving apparatus

    A receiving apparatus for, in a case that an application program is executed at a television receiving apparatus, permitting execution of the application program during a period in which a predetermined channel or a broadcast program is viewed.

  • Method and apparatus for adaptive channel selection

    A method and apparatus for computing a schedule of channels is disclosed. The method comprises the steps of accepting a series of commands to tune a plurality of channels sequentially from an ordered schedule of channels; determining duration of a time period between each of the series of commands; and prioritizing the schedule of channels according to the duration of the time period during which each channel is tuned. The apparatus comprises a user interface for accepting a series of commands to tune a plurality of channels sequentially from an ordered schedule of channels and a processor, communicatively coupled to a memory, the processor implementing a timer for determining a duration of a time period during which each channel is tuned and prioritizing the schedule of channels according to the duration of the time period during which each channel is tuned.

  • Providing alternative services based on receiver configuration and type of display device

    The present invention provides a system for providing alternative services in a television system. In one implementation, a subscriber is provided an alternative service upon attempting to access an unauthorized service, thereby providing a framework for efficient control of conditional access and enhanced services. In addition, in one implementation, user device limitations or variations are handled conveniently through the same multi-purpose system for providing alternative services.

  • System and methods for tracking processing unit usage

    A method and system for monitoring the CPU time consumed by a software agent operating in a computer system. A resource tracking process is executed on the system. When an operating agent is detected, an agent lifetime timer is initialized. Then, CPU resources for the agent are identified and stored. Checks are made at predetermined intervals to determine if the agent is still alive. When the agent terminates, a measurement is made of the CPU time utilized by the agent. The measurement is then stored in memory.

  • Design structure for performing iterative synthesis of an integrated circuit design to attain power closure

    A design structure that performs iterative synthesis of an integrated circuit design to attain power closure is described. In one embodiment, the design structure is embodied in a computer readable medium and has the capability to initially synthesized an integrated circuit design to satisfy timing and power constraints. Results from the initial synthesis are fed back into the synthesis process where specific nodes in the circuit design are targeted to satisfy the timing and power constraints. Selected nodes in the circuit design are worked on in an iterative manner until it has been determined that all of selected nodes have undergone evaluation for satisfying timing and power constraints. Once all of the selected nodes have undergone evaluation for satisfying timing and power constraints, then a final netlist representing the circuit design is generated.

  • Music reproducing device that temporarily memorizes music information from notifying section when operating function unit is inactive

    A music reproducing device comprises an operating function unit and a reproducing function unit, wherein the reproducing function unit comprises an information notifying section for notifying the operating function unit of information of a piece of music to be reproduced, a notification controlling section for controlling the notification of the music information to the operating function unit by the information notifying section when the operating function unit is in an inactive state, and a memory section for temporarily memorizing the music information from the information notifying section when the operating function unit is in the inactive state, and the operating function unit comprises an information obtaining section for obtaining the music information from the memory section when the operating function unit recovers from the inactive state to an active state.

  • Secure execution of a computer program

    Hijacking of an application is prevented by securing execution of a computer program on a computing system. Prior to execution of the computer program, the computer program is analyzed to identify permitted targets of all indirect transfers. An application-specific policy based on the permitted targets is created. When the program is executed on the computing system, the application-specific policy is enforced such that the program is prohibited from executing indirect transfer instructions that do not target one of the permitted targets.

  • Methods and systems for a receiver to allocate bandwidth among incoming communications flows

    Disclosed are methods and systems for a receiver to autonomously allocate bandwidth among its incoming communications flows. The incoming flows are assigned priorities. When it becomes necessary to alter the allocation of bandwidth among the flows, the receiver selects one of the lower priority flows. The receiver then causes the selected flow to delay sending acknowledgements of messages received to the senders of the messages. In most modern protocols, senders are sensitive to the time it takes to receive acknowledgements of the messages they send. When the acknowledgement time increases, the sender assumes that the receiver is becoming overloaded. The sender then slows down the rate at which it sends messages to the receiver. This lowered sending rate in turn reduces the amount of bandwidth used by the flow as it comes into the receiver. This frees up bandwidth which can then be used by higher priority flows.

  • Automated display of an information technology system configuration

    An Information Technology (IT) system display method and computer program product. A description is provided of a configuration of devices, network segments, and vertical connectors relating to an IT structure. The devices are initially distributed to form a distribution of the devices in a matrix representing a display screen. A defined goal value of the configuration is a function of a length and weight of each network segment, a length and weight of each vertical connector, and a penalty for each crossing of a device by a network segment. An overlay pattern of the network segments and the vertical connectors overlayed on the matrix is displayed in accordance with the description and the final distribution of the devices in the matrix. The goal value for the final distribution is lower than for the initial distribution. The final distribution is displayed on the display screen together with the overlay pattern.

  • Remote test station configuration

    An online test platform facilitates the configuration, development, delivery, and management of educational tests with interactive participation by students, teachers, proctors, and administrators even when some or all of them are remotely located. The platform may include an installation protocol to configure a computing facility and prevent other applications from executing during an exam, administrator interfaces, test proctor interfaces, and test taker (e.g. student) interfaces to allow each participant to view, navigate, and interact with aspects of the online test platform that are intended to meet their needs.

  • System and method for the automated notification of compatibility between real-time network participants

    The present invention is a method and system for using predetermined preferences/characteristics to ascertain personal compatibility between network or chat room participants based upon profile information. When the system determines that these preferences are favorable for interpersonal compatibility, the system will automatically notify or page the participants so as to facilitate their introduction. Further functionality, aside from the compatibility based upon profile information, includes e-mail and other electronic notification of personal compatibility as well as geographic compatibility.

  • Transfer of table instances between databases

    A system and computer program product for transferring N table instances X.sub.1, X.sub.2, . . . , X.sub.N of a table T from a source database S to destination databases D.sub.1, D.sub.2, . . ., D.sub.N, respectively. The method is implemented by executing a computer code by a processor of a computer system. N is at least 1. For I=1, 2, . . . , N the method includes: determining whether the table T has been defined for destination database D.sub.I, and if it is determined that the table T has not been defined for the destination database D.sub.I then defining the table T for the destination database D.sub.I; and transferring the instance X.sub.I of the N table instances from the source database S into the defined table T of the destination database D.sub.I

  • System and method for processing data pertaining to financial assets

    A data processing system for processing loan data for a plurality of loans including a data storage system configured to store loan data for the plurality of loans and a user interface including one or more web pages configured to enable a servicer using a remote computing system to transfer loan data over the Internet to and from the data processing system. The user interface includes a loan activity processing function configured to receive servicer loan data including loan activity data from the servicer, a trial balance processing function configured to enable the servicer to submit servicer loan data for comparison with the stored loan data, and a loan level browsing function configured to allow the servicer to view stored loan data. The data processing system further includes loan process and compare logic which includes an amortization/calculation processor configured to perform validation calculations on servicer loan data based on stored loan data, a loan activity processor configured to process the loan activity data, validate the loan activity data based on the stored loan data, and update the stored loan data based on the loan activity data. The loan process and compare logic further includes a trial balance processor configured to compare servicer loan data with stored loan data.

  • Cash dispensing automated banking machine system and method

    Automated transaction machines operate responsive to data read from data bearing records to carry out financial transfers, which can include the dispense of currency notes and the conduct of transactions. In some cases a user is enabled to dispense merchandise from a self-service dispensing machine and is also enabled to selectively receive cash value by charging the amount of such value to a source of monetary value associated with data read from a machine readable article such as a card (80, 82). Alternatively, a user may receive cash value by presenting a printed voucher or other item to a service provider located at a facility (14) at which the service provider exchanges the voucher or other item for cash. Alternatively, cash may be dispensed to the user directly from the self-service dispensing machine. Alternatively the user may pick up merchandise ordered through the machine at a delivery station disposed from the machine.

  • Efficiency optimized hybrid operation strategy

    A propulsion system for a fuel cell hybrid vehicle that includes a fuel cell system and an EESS, where the propulsion system employs an algorithm for increasing system efficiency. A power limit value is defined as the maximum system efficiency times the charge/discharge efficiency of the EESS. If the vehicle operator requests a power greater than the power limit value, then the fuel cell system will preferably provide the power, and if the power request from the vehicle operator is less than the power limit value, then the EESS will preferably provide the power. The algorithm also considers changing operation conditions and parameters that impact the fuel cell system efficiency and the electric energy storage system efficiency, such as the state of charge of the EESS and regenerative braking.

  • Passive back-flushing thermal energy system

    This invention provides a thermal energy system comprising a heat exchanger for transferring thermal energy between a source and a load, the heat exchanger having a primary side associated with the source, and a secondary side for conducting a fluid associated with the load, wherein the secondary side of the heat exchanger is passively back-flushed upon consumption of a portion of the fluid. Passive back-flushing prevents fouling of the heat exchanger due to sediments, scale, and mineral deposits which may be present in the circulating fluid.

  • Adaptive greedy method for ordering intersecting of a group of lists into a left-deep AND-tree

    The embodiments of the invention provide a method of ordering an intersecting of a group of lists into a left-deep AND-tree. The method begins by performing a first selecting process including selecting a top list, corresponding to a top leaf of the left-deep AND-tree, from the group of lists to leave remaining lists of the group of lists. The top list can be the smallest list of the group of lists. The method can also select a pair of lists from the group of lists, such that the pair of lists has the smallest intersection size relative to other pairs of lists of the group of lists. Next, the method estimates intersections of the remaining lists with the top list by estimating an amount of intersection between the remaining lists and the top list. This involves sampling a portion of the remaining lists. The method also includes identifying larger list pairs having smaller intersections sizes when compared to smaller list pairs having larger intersections sizes.

  • Mechanism for characterizing soft failures in systems under attack

    A system and method to identify and characterize nonfatal failures of a device-under-analysis (DUA). A security analyzer executes attacks to test the security of the DUA. During the attacks, the security analyzer periodically sends an instrumentation command to the DUA and measures the time the DUA takes to successfully respond to the instrumentation command (the response time sample). The security analyzer uses the response time samples to identify and/or characterize the nonfatal failures in the DUA caused by the attacks.

  • System and method for backing up data

    A method is provided to facilitate the detection of file tampering, such as a computer virus, on a computer. In one example, a digital fingerprint is generated for each file on the computer using a substantially collision-free algorithm. The digital fingerprints of the computer files are compared with digital fingerprints of the computer files generated when the files were previously saved. If the digital fingerprint of that file differs from the digital fingerprint generated when that file was previously saved, a computer virus or other tampering may exist on the file.

  • Transmitter, signal transfer method, data distribution system and method of same, data receiver, data provider and method of same, and data transferer

    To enable usage of content at a receiver which does not have a copying function even if copyright protection is provided. Model names of receivers not having a function enabling copying of content are held in an authentication processing circuit (151) of a transmitter (10). When a model name obtained from a connected receiver (40) is held, regardless of whether the content is copyright protected, a signal selection circuit (122) selects a terminal a side, a switch (123) is turned on, and an unencrypted signal is transmitted. When a change of the receiver (40) is detected by a hot plug detection function or a plug and play function at a processing circuit (152) during the transfer of a signal of copyright protected content without providing copyright protection, the selection circuit (122) is made to select a terminal b side or the switch (123) is turned off to suspend the transfer of the non-copyright protected signal. The information indicating the receiver is held in a tamper-proof updateable manner.

  • Methods and systems for assigning access control levels in providing access to resources via virtual machines

    A system for granting access to resources includes a client machine, a collection agent, a policy engine, and a broker server. The client machine requests access to a resource. The collection agent gathers information about the client machine. The policy engine receives the gathered information and assigns one of a plurality of levels of access responsive to application of a policy to the received information. The broker server establishes, responsive to the assigned level of access, a connection between the client machine and a computing environment providing the requested resource, the computing environment provided by a virtual machine.

  • System and method of resolving discrepancies between diverse firewall designs

    A system, computer-implementable method, and computer-usable medium for resolving discrepancies between diverse firewall designs. In a preferred embodiment of the present invention, a firewall design manager receives at least two designs for a rule-based system and computing at least one functional discrepancy between the at least two designs utilizing decision diagrams.

  • Method for reducing channel change time of internet protocol television (IPTV) and IPTV service provision server for implementing the same

    The present invention provides a method for reducing channel change time of an IPTV and an IPTV service provision server for implementing the same, which comprise: determining the type of each of individual channels to be provided to a user and the number of additional intraframes required to be inserted into video data to be provided via the channels; inserting the additional intraframes corresponding to the determined number into the video data; encoding the video data; and transmitting the encoded video data to a first router or a second router according to the determined channel type, before receiving a channel request signal from the user.

  • System and method for simultaneously displaying video programming and instant messaging

    Instant messaging (IM) and TV programming are displayed simultaneously on a TV screen. An instant messaging window on the screen displays posted messages and identifies the TV program (if any) being currently viewed by each user posting messages. An icon accompanying a message can be selected by a message recipient to permit a telephone call to be automatically dialed and completed to the message sender. Video files attached to sent messages include a key which may be compared to a key at the destination, so that the video file may be viewed by the recipient only if the there is a match. Data collected at a server managing the instant messaging may be used to monitor message, television and telephone activity, as well as demographic data associated with the IM users.

  • Signal processing apparatus, signal processing method, and recording medium

    A signal processing apparatus includes the following elements. A plurality of signal processing software modules perform unit signal-processing steps of signal processing by means of software processing. An instruction input receiving unit receives an instruction. A virtual connecting unit sets up a virtual connection between inputs and outputs of the signal processing software modules in response to the received instruction. A circuit structure information storing and managing unit stores and manages the virtually connected signal processing software modules. A path routing unit routes a signal processing path to determine the order in which the stored signal processing software modules perform the signal processing. A signal processing executing unit performs the signal processing by sequentially executing the signal processing software modules in the determined order. The path routing unit determines whether a feedback loop including no delay element is generated in a circuit composed of the signal processing software modules.

  • Estimating resource usage system for allocating resources to tasks based upon the rating value of tasks and resources mapping

    A method for allocating resources of a group of resources to tasks of a group of tasks, the method comprising: forming a resource set comprising a resource record for each of the resources of the group of resources, each resource record having one or more fields representative of attributes of the respective resource; forming a task set comprising a task record for each of the tasks of the group of resources, each task record having one or more fields, each field holding data representative of an attribute of the respective task; condensing the task set by one or more iterations of the steps of: i. selecting two or more tasks of the task set; ii. adding to the task set an aggregate task record having one or more fields, each such field corresponding to a field of each of the task records of the selected tasks and holding data representative of the collective attributes of the task records of the selected tasks in those fields; and iii. removing the task records of the selected tasks from the task set; forming at least two mappings of some or all of the members of the resource set on to one or more members of the task set; calculating, for each of the mappings, a rating value dependent on the allocation of resources to the or each aggregate task in that mapping; comparing the rating values of the mappings; and selecting one of the mappings for further processing in dependence on the result of the said comparing step.

  • Method for improving performance of executable code

    A computer-implemented method, computer program product and data processing system to improve runtime performance of executable program code when executed on the data-processing system. During execution, data is collected and analyzed to identify runtime behavior of the program code. Heuristic models are applied to select region(s) of the program code where application of a performance improvement algorithm is expected to improve runtime performance. Each selected region is recompiled using selected performance improvement algorithm(s) for that region to generate corresponding recompiled region(s), and the program code is modified to replace invocations of each selected region with invocations of the corresponding recompiled region. Alternatively or additionally, the program code may be recompiled to be adapted to characteristics of the execution environment of the data processing system. The process may be carried out in a continuous recursive manner while the program code executes, or may be carried out a finite number of times.

  • Systems and methods for detecting behavioral features of software application deployments for automated deployment management

    A system for monitoring and analyzing a deployment of a software application is disclosed. The system includes a monitoring component that collects streams of data values of time-variant state metrics associated with the deployment, and a feature detector that analyzes the streams to identify features known to be associated with potential problems. Detected features can include deviations of a signal from a normalcy band, a rising or descending trend in signal behavior, deviations from seasonal or cyclical normalcy bands, and the like.

  • Automatic conversion of text-based code having function overloading and dynamic types into a graphical program for compiled execution

    Automatic conversion of textual program code to graphical program code is performed. The method automatically translates the given functionality of a textual program code into executable graphical program code, corresponding to the same functionality. The method includes a parsing routine that generates a syntax tree and code generation routines, which create graphical program code from the syntax tree.

  • Method and apparatus for testing a circuit

    A system and method for testing a memory array are disclosed which may include establishing a stored data vector, including a plurality of data bits, within at least one circuit; applying one or more logical operations on the stored data vector to generate a succession of original data vectors at the at least one circuit; transmitting the succession of original data vectors through a memory array to provide a succession of exercised data vectors; comparing the succession of exercised data vectors to the succession of respective original data vectors; and determining whether the memory array passes or fails based on the comparing step.

  • Multiple embedded memories and testing components for the same

    A method of sharing testing components for multiple embedded memories and the memory system incorporating the same. The memory system includes multiple test controllers, multiple interface devices, a main controller, and a serial interface. The main controller is used for initializing testing of each of the dissimilar memory groups using a serial interface and local test controllers. The memory system results in reduced routing congestion and faster testing of plurality of dissimilar memories.

  • Optimization methods for the insertion, protection, and detection of digital watermarks in digital data

    Disclosed herein are methods and systems for encoding digital watermarks into content signals. Also disclosed are systems and methods for detecting and/or verifying digital watermarks in content signals. According to one embodiment, a system for encoding of digital watermark information includes: a window identifier for identifying a sample window in the signal; an interval calculator for determining a quantization interval of the sample window; and a sampler for normalizing the sample window to provide normalized samples. According to another embodiment, a system for pre-analyzing a digital signal for encoding at least one digital watermark using a digital filter is disclosed. According to another embodiment, a method for pre-analyzing a digital signal for encoding digital watermarks comprises: (1) providing a digital signal; (2) providing a digital filter to be applied to the digital signal; and (3) identifying an area of the digital signal that will be affected by the digital filter based on at least one measurable difference between the digital signal and a counterpart of the digital signal selected from the group consisting of the digital signal as transmitted, the digital signal as stored in a medium, and the digital signal as played backed. According to another embodiment, a method for encoding a watermark in a content signal includes the steps of (1) splitting a watermark bit stream; and (2) encoding at least half of the watermark bit stream in the content signal using inverted instances of the watermark bit stream. Other methods and systems for encoding/decoding digital watermarks are also disclosed.

  • Method of generating anti-collusion fingerprint codes using (n.sup.a,n.sup.2a-2,n.sup.a-1,n,0,1) GD-PBIBD

    Disclosed herein is a method of generating anti-collusion fingerprint codes using a (n.sup.a, n.sup.2a-2, n.sup.a-1, n, 0, 1) GD-PBIBD. The fingerprint codes are generated using computer equipment that executes a program for executing a program for generating the fingerprint codes. The method includes step 1 of receiving an arbitrary prime number n and an arbitrary integer a larger than 3, step 2 of generating an n.times.n index matrix, step 3 of generating n n.times.n type_i matrixes, step 4 of generating an n.sup.2.times.n.sup.2 matrix using the n.times.n index matrix and the n.times.n type_i matrixes, step 5 of generating an n.sup.a.times.n.sup.2a-2 matrix, and step 6 of extracting one arbitrary column from the n.sup.a.times.n.sup.2a-2 matrix.

  • Cloud based modeling for enhancing spreadsheets

    A method and development tool for developing an application over a spreadsheet, the development tool comprising design components for designing a user interface element, a logic-related element that consumes a service from the spreadsheets. and a connector connecting the user interface element and the logic-related element; a communication component; code generation components for generating code associated with the user interface element, code associated with the logic-related element, code associated with the connector, and code associated with communication; and a deployment component for deploying an application based on the code. The method and development tool enable the creation of applications over a spreadsheet, the applications comprising both user interface and business logic. The application can be executed as a web service, and also in a cloud computing environment.

  • STARTING VIRTUAL INSTANCES WITHIN A CLOUD COMPUTING ENVIRONMENT

    Embodiments of the present invention provide a system that leverages the Operational Support System(s) (OSS) and Business Support system(s) (BSS) of a (e.g., public) computing Cloud with a service to automate virtual instance restarts. For example, under embodiments of the present invention, a failed virtual instance is detected within the Cloud computing environment, and a request for a new virtual instance is received in response thereto. Upon receiving the request, an entitlement of a user associated with the failed virtual instance will be tested. Specifically, a set of authentication calls and checks are deployed in accordance herewith to ensure the integrity of the requests, as well as the authorization of the requester for the resource use. Assuming testing is passed, a countdown timer associated with the failed virtual instance will be decreased. When the countdown timer reaches a predetermined threshold (e.g., zero), the new virtual instance will be started, the failed virtual instance will be terminated, and the countdown timer will be reset/restarted by instance. Integration with BSS further allows for monitoring and charging of service usage as well as opening the option for pay-as-you-go charges for the restart service itself.

  • REQUESTING CLOUD DATA STORAGE

    A method begins by a processing module determining that a data storage request is a cloud data storage request. The method continues with the processing module determining at least one of a cloud storage access reliability indication and a cloud storage data reliability indication for the data storage request. The method continues with the processing module sending the data storage request and the at least one of cloud storage access reliability indication and cloud storage data reliability indication to a cloud storage system.

  • MANAGING PERFORMANCE INTERFERENCE EFFECTS ON CLOUD COMPUTING SERVERS

    A method described herein includes an act of receiving indications of threshold levels of quality of service to maintain for each of a plurality of virtual machines sharing computing resources on a server, wherein quality of service is affected by interference caused by the plurality of virtual machines sharing the computing resources on the server. The method also includes an act of dynamically allocating computing resources amongst the plurality of virtual machines to maintain levels of quality of service for each of the plurality of virtual machines at or above the threshold levels of quality of service.

  • DEVELOPMENT PLATFORM FOR ROBOTIC SYSTEMS

    A unified system for development of robotics and other cyber-physical systems is discussed. The unified system includes a platform that integrates the processing of actuators and sensors and other modules. The platform is inter-operable into many existing systems. Various modules are developed to do discrete tasks that are commonly found in robotics such as moving motors or reading and controlling sensors. The modules communicate with each other and with other devices such as computers and user built modules through the use of a commonly supported abstract communication protocol.

  • ROBOTIC DEVICES WITH AGENT DELIVERY COMPONENTS AND RELATED METHODS

    Various robotic devices and related medical procedures are disclosed herein. Each of the various robotic devices have an agent delivery component. The devices include mobile robotic devices and fixed base robotic devices as disclosed herein. The agent delivery component can have at least one agent reservoir and a discharge component in fluidic communication with the at least one reservoir.

  • Joints for Prosthetic, Orthotic and/or Robotic Devices

    An artificial foot device may include a talus body, a core operatively coupled with the talus body by a first joint, and a toe operatively coupled with the core by a second joint. A vertical restraint link between the toe and the core and provides a coupling for the second joint. A toe insert limits motion of the toe relative to the core. A toe bushing receives a tension member for operatively coupling the toe to the talus body. The vertical restraint link, toe insert and bushing constrains relative movement between the core and the toe at the second joint. Relative movement of the core and the talus body at the first joint is guided and constrained by pivot bearings. Constrained relative movement between the talus body and the core corresponds to a coordinated movement of a first joint and a second joint during ambulation of a natural human foot.

  • AIRFLOW-SENSING COMPUTER CURSOR GENERATOR AND AIRFLOW-SENSING MOUSE

    An airflow-sensing computer cursor generator includes a microprocessor and plural air flow rate sensors. The plural air flow rate sensors are used for sensing airflow rates resulted from a moving action of an inductor in plural directions, thereby generating respective air flow rate signals corresponding to the plural directions. The microprocessor is used for judging a moving direction and a displacement value of the inductor according to the air flow rate signals, thereby generating a computer cursor signal.

  • SENSOR DEVICE FOR INTERRUPTING IRRIGATION

    Methods and apparatus are provided herein for permitting or interrupting irrigation using sensor equipment. In one embodiment, a method for controlling irrigation comprising the steps of: generating an indication representing the amount of rain fall at a sensor unit; transmitting a signal comprising at least the indication from the sensor unit to an interface unit, wherein the interface unit is adapted to cause an interruption of programmed watering schedules of an irrigation controller; receiving the signal at the interface unit; determining, based at least on the indication from the signal, whether irrigation should be interrupted; and generating an interrupt command to interrupt irrigation.

  • ROBOTIC SURGERY SYSTEM INCLUDING POSITION SENSORS USING FIBER BRAGG GRATINGS

    A surgical instrument is provided, including: at least one articulatable arm having a distal end, a proximal end, and at least one joint region disposed between the distal and proximal ends; an optical fiber bend sensor provided in the at least one joint region of the at least one articulatable arm; a detection system coupled to the optical fiber bend sensor, said detection system comprising a light source and a light detector for detecting light reflected by or transmitted through the optical fiber bend sensor to determine a position of at least one joint region of the at least one articulatable arm based on the detected light reflected by or transmitted through the optical fiber bend sensor; and a control system comprising a servo controller for effectuating movement of the arm.

  • Method for simultaneously switching energy-saving modes of plural computer devices via KVM switc

    The present invention is to provide a method for simultaneously switching energy-saving modes of plural computer devices via a KVM switch including a CPU, a plurality of connection ports, a real-time clock (RTC) and a memory unit, wherein the memory unit stores a timetable containing at least one scheduled time and at least one corresponding energy-saving procedure each including a control instruction. The CPU reads the current time of the RTC and, after determining that the timetable contains a scheduled time corresponding to a current time, reads the control instruction in the energy-saving procedure corresponding to the scheduled time. Then, the CPU sends an energy-saving instruction to the computer device connected to each of the connection ports that are specified in the control instruction, thereby switching the energy-saving modes (e.g., a hibernation mode, sleep mode, OFF mode or ON mode) of the specified computer devices simultaneously.

  • Network Scheduling for Energy Efficiency

    A network comprising a plurality of network devices is configured to implement scheduling for energy efficiency. In one aspect, a set of network devices interconnected in a line within a network is identified, and a common frame size is established. For each of the network devices of the line, active and inactive periods for that network device are scheduled in a corresponding frame having the common frame size, with the frames in the respective network devices of the line being time shifted relative to one another by designated offsets. For each of one or more of the active periods of each of the network devices of the line, received packets are scheduled for processing in that network device.

  • METHOD AND SYSTEM FOR MONITORING AN ENERGY STORAGE SYSTEM FOR A VEHICLE FOR TRIP PLANNING

    One or more embodiments may include a trip planning system for planning a trip based on the charge of an electric vehicle battery. The trip planning system may include one or more computers located remotely from an electric vehicle which may have one or more battery packs for powering the electric vehicle. The computer(s) may be configured to receive geographic parameters defining a trip and a battery charge status of the one or more electric vehicle battery packs. The computer(s) may be further configured to determine that the trip cannot be completed based on the battery charge status. The computer(s) may additionally be configured to present a battery charge requirement for completing the trip.

  • Automobile Scanning System

    A dual energy x-ray imaging system searches a moving automobile for concealed objects. Dual energy operation is achieved by operating an x-ray source at a constant potential of 100KV to 150KV, and alternately switching between two beam filters. The first filter is an atomic element having a high k-edge energy, such as platinum, gold, mercury, thallium, lead, bismuth, and thorium, thereby providing a low-energy spectrum. The second filter provides a high-energy spectrum through beam hardening. The low and high energy beams passing through the automobile are received by an x-ray detector. These detected signals are processed by a digital computer to create a steel suppressed image through logarithmic subtraction. The intensity of the x-ray beam is adjusted as the reciprocal of the measured automobile speed, thereby achieving a consistent radiation level regardless of the automobile motion. Accordingly, this invention provides images of organic objects concealed within moving automobiles without the detritus effects of overlying steel and automobile movement.

  • CARBON DIOXIDE FEEDBACK FOR AUTOMOBILE

    A carbon dioxide feedback system and a method of providing carbon dioxide feedback in a computer system is provided. The method includes computing an amount of carbon dioxide generation avoided by a vehicle at a processor, calculating a number of equivalent trees based on the computation, and displaying the number of equivalent trees on a display device.

  • VEHICULAR CONTROL OBJECT DETERMINATION SYSTEM AND VEHICULAR TRAVEL LOCUS ESTIMATION SYSTEM

    In a vehicular control object determination system, locus correlation degree calculator calculates a degree of correlation between a future travel locus of a vehicle estimated by first travel locus estimator based on a vehicle speed and a yaw rate and a future travel locus of the vehicle estimated by second travel locus estimator based on a past travel locus of the vehicle calculated by travel locus calculator. When control object determiner determines a control object based on the travel locus estimated by the first travel locus estimator and predetermined control object determination conditions, the control object determination conditions are modified according to the degree of correlation, that is, the degree of reliability of the travel locus estimated by the first travel locus estimator, thereby achieving both accuracy with which the control object is determined and determination of the control object at a distance.

  • Data Load Redistribution Within a Relay Enhanced Telecommunication Network

    It is described a method for changing the data load distribution within a telecommunication network comprising including a first base station, a second base station and a relay node being connected to the first base station and/or to the second base station. The described method includes (a) establishing for each of a plurality of user equipments a first indirect connection to the first base station via the relay node, (b) establishing in a collective manner for each of the plurality of user equipments a second indirect connection to the second base station via the relay node, and (c) terminating in a collective manner for each of the plurality of user equipments the first indirect connection. It is further described a network element, which is adapted to carry out the above described data load redistribution method, and a computer program, which is adapted for controlling the above described data load redistribution method.

  • SYSTEMS AND METHODS FOR TRANSACTIONS ON THE TELECOM WEB

    Embodiments of the invention broadly contemplate systems, methods, apparatuses and program products that leverage the mobile web, especially the spoken (telecom) web, to handle transactions. According to embodiments of the invention, in essence, a mobile device such as a phone is used as a terminal, remote authentication is employed, and a challenge response using a per transaction audio based code is used as a confirmation. Embodiments of the invention also provide further protection against repudiation, and greater trust in the transaction, by employing witnesses.

  • SYSTEM FOR EXTRACTING RALATION BETWEEN TECHNICAL TERMS IN LARGE COLLECTION USING A VERB-BASED PATTERN

    Disclosed herein is a system structure for extracting relations between technical terms within a large amount of literature information using verb-based patterns. The present invention provides a system that is capable of extracting relations based on verb-based patterns from abstract and bibliography databases in all fields of science and technology using a Tech Association Mining Appliance (TAMA) capable of detecting the technical terms of text and relations therebetween in academic literature databases in the fields of science and technology. The present invention has an advantage of providing a practical relation extraction system structure using a number of academic databases.

  • ENERGY FACILITY CONTROL SYSTEM

    An energy facility control system transforms the manner in which energy facilities create, modify, share, and store information during all phases of their lifecycles, from licensing through construction and decommissioning. The energy facility control system provides energy operators and their suppliers with collaborative toolsets to help improve accuracy, reliability and efficiency during every stage of an energy facility's lifecycle.

  • BIONIC MOTION

    A camera that can sense motion of a user is connected to a computing system (e.g., video game apparatus or other type of computer). The computing system determines an action corresponding to the sensed motion of the user and determines a magnitude of the sensed motion of the user. The computing system creates and displays an animation of an object (e.g., an avatar in a video game) performing the action in a manner that is amplified in comparison to the sensed motion by a factor that is proportional to the determined magnitude. The computing system also creates and outputs audio/visual feedback in proportion to a magnitude of the sensed motion of the user.

  • Fault-and Variation-Tolerant Energy - and Area-Efficient Links for Network-on-Chips

    The present invention provides methods for detecting and correcting transmission errors in inter-router links of Network-on-Chip (NoC) architectures. A NoC has repeaters along its bus lines. The output of a main repeater is compared and multiplexed with the output of a shadow repeater. If these outputs are the same the multiplexer outputs the output of the main repeater, otherwise an error is detected and the multiplexer outputs the output of the shadow repeater.

  • SENSOR SIGNAL ALIGNMENT

    Methods and systems, including computer readable mediums, are provided for transforming a measurement made relative to a first reference frame into a corresponding measurement relative to a second reference frame. Sensor signals that are produced by sensors in response to the sensors' motion relative to the first reference frame are transformed using a transformation matrix. The transformation generates corrected sensor signals that are relative to the axes of the second reference frame.

  • Power controlling integrated circuit and retention switching circuit

    A power control integrated circuit is provided having a voltage switching device and a retention switching device that has an input from an overdrive voltage supply such that in a retention enabled configuration a retention switching device is switched on more strongly relative to being both coupled to and driven from the voltage supply input signal associated with the voltage switching device. An overdriven retention switching device is provided as a separate entity from the voltage switching device itself and a computer readable storage medium is provided storing a data structure comprising a standard cell circuit definition for use in generating validating the circuit layout of a circuit cell of an integrated circuit. The circuit cell comprising an overdriven retention switching device. A further data structure corresponding to a standard cell is provided comprising an overdriven retention switching device and a voltage switching device and yet a further standard cell data structure is provided comprising an overdriven voltage switching device.

  • WIRELESS UPDATING OF HEARING DEVICES

    The method of manufacturing a firmware-updated programmable hearing device comprising at least one processor and a memory unit (7) in which hearing device firmware (8a) is stored, comprises the step of executing an update application (9) in said processor installing an updated version (81b) of at least a portion (81a) of the hearing device firmware (8a) in said memory unit (7). The system for updating the firmware of a programmable hearing device as described above comprises: an update apparatus comprising a communication interface for communication via a wireless communication link and a storage unit (13) in which an update application (9) is stored, which is designed to be executed in said processor installing an updated version (81b) of at least a portion of the hearing device firmware in said memory unit (7). The invention allows, in a memory space saving way, to update in a wireless manner the firmware of a hearing device including that portion (81a) of the firmware which is required for the wireless communication.

  • SAMPLING DEVICE INTERFACES

    The present invention generally relates to systems and methods for delivering and/or withdrawing a substance or substances such as blood or interstitial fluid, from subjects, e.g., from the skin and/or from beneath the skin. In one aspect, the present invention is generally directed to devices and methods for withdrawing or extracting blood from a subject, e.g., from the skin and/or from beneath the skin, using devices containing a fluid transporter (for example, one or more microneedles), and a storage chamber having an internal pressure less than atmospheric pressure prior to receiving blood. In some cases, the device may be self-contained, and in certain instances, the device can be applied to the skin, and activated to withdraw blood from the subject. The device, in some cases, may be interfaced with external equipment to determine an analyte contained within a fluid contained within or collected by the device. For example, the device may be mounted or engaged on an external holder, the device may include a port for transporting fluid out of the device, the device may include a window for interrogating a fluid contained within the device, or the like. The device, or a portion thereof, may then be processed to determine the blood and/or an analyte within the blood, alone or with an external apparatus. For example, blood may be withdrawn from the device, and/or the device may contain sensors or agents able to determine the blood and/or an analyte suspected of being contained in the blood. Other aspects of the present invention are directed at other devices for withdrawing blood (or other bodily fluids, e.g., interstitial fluid), kits involving such devices, methods of making such devices, methods of using such devices, and the like.

  • VEHICULAR MICROPHONE SYSTEM AND METHOD FOR POST PROCESSING OPTIMIZATION OF A MICROPHONE SIGNAL

    A vehicular microphone system (200) for post processing optimization of a microphone signal includes a first transducer (201) and second transducer (203) separated by a predetermined distance within an automotive mirror. A first high pass filter network (205) is connected to the first transducer (201) while a second high pass filter network (207) connected to the second transducer (203). A low frequency shelving filter (209) is used for receiving the output from the second high pass filter (207). A first all pass filter (211) is connected to the low frequency shelving filter (209) and a second all pass filter (213) is used in connection with the first all pass filter (211) for tailoring audio characteristics. A summing amplifier (215) is used for summing the output of the first high pass filter network (201, 205) and the second all pass filter network (203, 207, 209, 211, 213) such that the first transducer (201) and second transducer (203) operate with improved directivity resulting in enhanced signal-to-noise performance in a substantially noisy vehicular environment.

  • METHOD TO MODEL VEHICULAR COMMUNICATION NETWORKS AS RANDOM GEOMETRIC GRAPHS

    A method for generating mathematical analysis of a communication protocol in a vehicular communications network. The method defines features of a vehicular network, which may include a graph of a street map within a geographic area. A random geometric graph with a plurality of parameters is generated. A plurality of communications protocols on the vehicular network are defined. A communication protocol over the random geometric graph is redefined. A communication protocol's basic properties and associated features on the random geometric graph are analyzed. Results of the analysis are generated. The results of the analysis based on the random geometric graph's parameters are translated into results based on the vehicular network features. The random geometric graph with the parameters are displayed. The parameters may include: a number of graph nodes; and a probability that any two nodes are communicably connected being expressed as a function of the vehicular network features.

  • RUBBING ENCRYPTION ALGORITHM AND SECURITY ATTACK SAFE OTP TOKEN

    The present disclosure proposes a secure way to generate the OTP code by way of a web browser. A user does not need any electronic device on hand to obtain OTP for 2FA login. A new Rubbing Encryption Algorithm (REAL) is proposed as the base technology. Implementation method of such web-based OTP token is presented and analyzed. It operates through a web-browser with a multiple REAL keys. It can be integrated into many secure Internet commerce applications as well. A system is provided for secure access to a software program or website. The system has a first entity with a computing device with a processor and a memory. The first entity provides a plurality of data items. The system also has a second entity with at least one display for displaying the plurality of data items. The data items are arranged in a predetermined format. The display also displays a prompt for a user identification and a prompt for a code. The second entity has a member with a transparent portion. The transparent portion comprises a periphery with a plurality of markings placed around the periphery. The markings point to a first direction or to an opposite second direction. The second entity overlays the member over the data items. The markings point to the plurality of data items to reveal a code. The code is input and permits access of the second entity to the computing device of the first entity.

  • METHODS AND SYSTEMS FOR EFFICIENT API INTEGRATED LOGIN IN A MULTI-TENANT DATABASE ENVIRONMENT

    Methods and systems for efficient API integrated login in a multi-tenant database environment and for decreasing latency delays during an API login request authentication including receiving a plurality of API login requests at a load balancer of a datacenter, where each of the plurality of API login requests specify a user identifier (userID) and/or an organizational identifier (orgID), fanning the plurality of API login requests across a plurality of redundant instances executing within the datacenter, assigning each API login request to one of the plurality of redundant instances for authentication, and for each of the respective plurality of API login requests, performing a recursive query algorithm at the assigned redundant instance, at one or more recursive redundant instances within the datacenter, and at a remote recursive redundant instance executing in a second datacenter, as necessary, until the login request is authenticated or determined to be invalid.

  • CLOUD DATA STORAGE SYSTEM

    A cloud data storage system includes a plurality of storing units, a plurality of processing units, and a plurality of user ends. The processing units are connected to the storing units via the Internet, and the user ends are connected to one of the processing units. An upload file to be stored by a user end is divided into a plurality of file blocks, and an algorithm is used to compute eigenvalues corresponding to the file blocks respectively. The eigenvalues is computed by applying another algorithm in order to decide which storing units the file blocks can be stored in. Each of the eigenvalues corresponds to a different storing unit. For a data uploading and downloading process, the eigenvalues are used to decide the final storage locations and the information associated with combining the transferred file.

  • METHOD AND APPARATUS FOR MANAGING SPAM MESSAGE IN MESSAGING SERVICE

    A method and apparatus for managing a spam message in a messaging service are disclosed. When a user reports a message determined as a spam message, he may directly select a sharing level of his personal information in order to prevent a leakage of the personal information according to a sharing policy, reports the spam message by transmitting only a hash value of the spam message in order to prevent an increase in traffic. With respect to reported spam messages, a user can access a spam server to check an errononeously reported message through a sorting algorithm.

  • MAPPING DOCUMENTS TO A RELATIONAL DATABASE TABLE WITH A DOCUMENT POSITION COLUMN

    Architecture that maps document data (e.g., XML-extended markup language) into columns of one table, thereby avoiding schema normalization problems through special data storage. Moreover, an algorithm is described that can translate a query (e.g., in XPath (XML path language), a query language for navigating through document elements and attributes of an XML document) into a relational algebra query of the document column representation. Based on the characteristics of the new mapping, query rewriting rules are provided that optimize the relational algebra query by minimizing the number of joins. The mapping of XML documents to the table is based on a summary structure and a hierarchical labeling scheme (e.g., ordpath) to enable a high-fidelity representation. Annotations are employed on the summary structure nodes to assist in mapping XML elements and attributes to the table.

  • METHOD AND SYSTEM FOR RATING PATENTS AND OTHER INTANGIBLE ASSETS

    A statistical patent rating method and system is provided for independently assessing the relative breadth ("B"), defensibility ("D") and commercial relevance ("R") of individual patent assets and other intangible intellectual property assets. The invention provides new and valuable information that can be used by patent valuation experts, investment advisors, economists and others to help guide future patent investment decisions, licensing programs, patent appraisals, tax valuations, transfer pricing, economic forecasting and planning, and even mediation and/or settlement of patent litigation lawsuits. In one embodiment the invention provides a statistically-based patent rating method and system whereby relative ratings or rankings are generated using a database of patent information by identifying and comparing various characteristics of each individual patent to a statistically determined distribution of the same characteristics within a given patent population. For example, a first population of patents having a known relatively high intrinsic value or quality (e.g. successfully litigated patents) is compared to a second population of patents having a known relatively low intrinsic value or quality (e.g. unsuccessfully litigated patents). Based on a statistical comparison of the two populations, certain characteristics are identified as being more prevalent or more pronounced in one population group or the other to a statistically significant degree. Multiple such statistical comparisons are used to construct and optimize a computer model or computer algorithm that can then be used to predict and/or provide statistically-accurate probabilities of a desired value or quality being present or a future event occurring, given the identified characteristics of an individual patent or group of patents.

  • AUCTION METHOD AND APPARATUS

    An automatic system for determining outcomes to an auction process represents the auction by a directed graph and uses a K best solutions algorithm to determine the K best solutions. The system uses a particular graphical representation. Constraints may be included directly into the graph.

  • Rain Sensor with Variable Shut Off

    An intelligent rain sensor incorporates at least one hygroscopic member and a sensor that generates signals representative of its amount of expansion due to absorption of moisture. A microcontroller executes a pre-programmed algorithm that determines at least the rate of expansion and uses that information to distinguish between actual rainfall events on the one hand, and high humidity, dew or a light sprinkle on the other hand, and sends a shut off command to an irrigation controller.

  • Motion Controller With Standard and User Customized Components

    System and method for developing a motion application. A motion manager component implementing a supervisory control function and at least one trajectory generation algorithm is stored on a motion controller. A first application programming interface (API) for interfacing the motion manager component to a user developed motion control application is displayed. A second API for interfacing the motion manager component to a user developed communication interface component is displayed. A user application executable for sequencing motion operations in the motion system is created using the first API is created in response to user input. A first communication interface component is created using the second API in response to user input, where the communication interface component is operable to interface with the motion manager component using the second API, and where the user developed communication interface component is executable to communicate with a motion element, e.g., a drive or simulation.

  • REAL TIME RADIATION TREATMENT PLANNING SYSTEM

    The invention relates to a real time radiation treatment planning system for use in effecting radiation therapy of a pre-selected anatomical portion of an animal body using hollow needles. According to embodiments of the invention, the system may include a processing means processing means-configured to perform a three-dimensional imaging algorithm and a three-dimensional image segmentation algorithm, with respect to one or more specific organs within the pre-selected anatomical portion and with respect to the needles, for converting the image data obtained with an imaging means into a three-dimensional image of the anatomical portion, using at least one single or multi-objective anatomy-based genetic optimization algorithm. For pre-planning or virtual simulation purposes, the processing means is arranged to determine in real time the optimal number and position of at least one of the needles, positions of energy emitting sources within the needles, and the dwell times of the energy emitting sources at the positions. For post-planning purposes, the processing means is arranged to determine, based on three-dimensional image information, in real time the real needle positions and the dwell times of the energy emitting sources for the positions.

  • READY AUTOMATED SCREENING, DIAGNOSIS & CLASSIFICATION TECHNIQUE FOR ALZHEIMER'S DISEASE USING MAGNETIC RESONANCE IMAGING SIGNAL FROM VENTRICULAR ZONE CONTOUR OF BRAIN

    The invention relates to a fully automated screening, diagnosis and classification technique for Alzheimer's disease using magnetic resonance imaging signals from the ventricular zone contour of the brain to get a fundamental index of brain deterioration comprising the steps: --obtaining a gray scale MRI image of the brain region; --applying a contour edge-detecting algorithm to the image; --employing a grid covering method for calculating a first order metric index of ventricular zone contour; --superimposing metric square grids of increasing edge length to the binary contour image and counting the metric grid squares; --plotting the logs of metric grid squares against the logs of edge lengths, wherein the gradient of the plot is the linear topological metric index.

  • REMOTE CONTROL OF TRANSMITTER-SIDE RATE ADAPTATION

    In general, this disclosure is directed to techniques for remotely controlling a transmitter-side rate adaptation algorithm. According to one aspect, a method includes detecting, with a receiver device, that a packet received from a transmitter is corrupted. The method further includes sending, with the receiver device, a positive acknowledgement for the packet to the transmitter in response to at least detecting that the packet is corrupted. According to another aspect, a method includes determining, with a receiver device, a targeted outcome for a rate adaptation algorithm performed by a transmitter. The method further includes using, with the receiver device, positive acknowledgements to remotely control the rate adaptation algorithm performed by the transmitter based on at least the targeted outcome.

  • COMPUTING CLUSTER PERFORMANCE SIMULATION USING A GENETIC ALGORITHM SOLUTION

    Illustrated is a system and method that includes identifying a search space based upon available resources, the search space to be used to satisfy a resource request. The system and method also includes selecting from the search space an initial candidate set, each candidate of the candidate set representing a potential resource allocation to satisfy the resource request. The system and method further includes assigning a fitness score, based upon a predicted performance, to each member of the candidate set. The system and method also includes transforming the candidate set into a fittest candidate set, the fittest candidate set having a best predicted performance to satisfy the resource request.

  • SYSTEM AND METHOD FOR IMPROVED COMPUTATIONAL PROCESSING EFFICIENCY IN THE HSEG ALGORITHM

    Disclosed herein are systems, methods, and non-transitory computer-readable storage media for processing image information using a more computationally efficient version of a previously developed HSEG (Hierarchical Segmentation) algorithm. The HSEG algorithm includes iterations intertwining two forms of region growing to produce a set of hierarchically related image segmentations. The first form is a commonly used approach in which regions are grown by merging the most similar spatially adjacent regions. The second form is a unique approach in which regions are grown by also merging spatially non-adjacent regions that are at least as similar as the spatially adjacent regions merged by the first form in the same iteration. The improved HSEG algorithm limits the regions considered for non-adjacent region merging in the second form of operation to regions having at least a minimum number of pixels. This minimum is dynamically controlled to optimize processing efficiency and image segmentation quality.

  • METHOD OF ANALYZING INTRINSIC PARALLELISM OF ALGORITHM

    A method of analyzing intrinsic parallelism of an algorithm, comprising: generating a dataflow graph which is composed of vertexes representing computation and directed edges denoting the dependency and flow of data from the algorithm; building a matrix representing the dataflow graph; and quantifying the intrinsic parallelism based on rank and dimension of the matrix representing the generated dataflow graph.

  • POWER ANALYSIS ATTACK COUNTERMEASURE FOR THE ECDSA

    Execution of the Elliptic Curve Digital Signature Algorithm (ECDSA) requires determination of a signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECDSA vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long term cryptographic key. By modifying the sequence of operations involved in the determination of the signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long term cryptographic key.

  • Simplified micro-bridging and roughness analysis

    The invention provides apparatus and methods for processing substrates using pooled statistically based variance data. The statistically based variance data can include Pooled Polymer De-protection Variance (PPDV) data that can be used to determine micro-bridging defect data, LER defect data, and LWR defect data.

  • Register retiming technique

    An electronic automation system performs register retiming on a logic design, which may be a logic design for a programmable logic integrated circuit. Register retiming is a moving or rearranging of registers across combinatorial logic in a design in order to improve a maximum operating frequency or fmax. In one implementation, the system includes machine-readable code, which may be stored on a computer-readable medium such as a disk, executing on a computer. The system balances timing in order to trade off delays between critical and noncritical paths. Register retiming may make changes to a design at a gate level.

  • Order independent method of performing statistical N-way maximum/minimum operation for non-Gaussian and non-linear distributions

    A method and system to improve the performance of an integrated circuit (IC) chip by removing timing violations detected by performing a statistical timing analysis, given distributions of process and environmental sources of variation. The distributions are quantized using a minimum distortion criterion into discrete values. For each timing node of the IC circuit, a discrete minimum and maximum operation is performed on the timing parameters using a subset of combinations of the discrete values. The results of the discrete minimum and maximum operation are then de-quantized and propagated to a subsequent timing node and edge thereof. The process continues until one or more primary inputs and outputs of the IC chip are reached. The design of the IC chip is modified by removing all the timing violations identified.

  • Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms

    A target software system is instrumented to generate behavior data representing a current observation or observation aggregate. A method then determines whether the current observation or observation aggregate warrants a second level examination; preferably, this determination is made by processing the current observation or observation aggregate through a first level detection algorithm that provides a provisional indication of a possible intrusion. If executing the first level detection algorithm indicates that the current observation or observation aggregate warrants a second level examination, the method continues by processing the current observation or observation aggregate through at least one second level detection algorithms to provide a more definite, fine grain indication of a possible intrusion. Multiple algorithms may be executed together within a single examination level, with the individual results then analyzed to obtain a composite result or output indicative of intrusive or anomalous behavior.

  • System and method for adaptive run-time reconfiguration for a reconfigurable instruction set co-processor architecture

    A method for adaptive runtime reconfiguration of a co-processor instruction set, in a computer system with at least a main processor communicatively connected to at least one reconfigurable co-processor, includes the steps of configuring the co-processor to implement an instruction set comprising one or more co-processor instructions, issuing a co-processor instruction to the co-processor, and determining whether the instruction is implemented in the co-processor. For an instruction not implemented in the co-processor instruction set, raising a stall signal to delay the main processor, determining whether there is enough space in the co-processor for the non-implemented instruction, and if there is enough space for said instruction, reconfiguring the instruction set of the co-processor by adding the non-implemented instruction to the co-processor instruction set. The stall signal is cleared and the instruction is executed.

  • Systems and methods for dynamically choosing a processing element for a compute kernel

    A runtime system implemented in accordance with the present invention provides an application platform for parallel-processing computer systems. Such a runtime system enables users to leverage the computational power of parallel-processing computer systems to accelerate/optimize numeric and array-intensive computations in their application programs. This enables greatly increased performance of high-performance computing (HPC) applications.

  • Parallel programming computing system to dynamically allocate program portions

    A computing system receives a program created by a technical computing environment, analyzes the program, generates multiple program portions based on the analysis of the program, dynamically allocates the multiple program portions to multiple software units of execution for parallel programming, receives multiple results associated with the multiple program portions from the multiple software units of execution, and provides the multiple results or a single result to the program.

  • Load balancing for multi-threaded applications via asymmetric power throttling

    A first execution time of a first thread executing on a first processing unit of a multiprocessor is determined. A second execution time of a second thread executing on a second processing unit of the multiprocessor is determined, the first and second threads executing in parallel. Power is set to the first and second processing units to effectuate the first and second threads to finish executing at approximately the same time in future executions of the first and second threads. Other embodiments are also described and claimed.

  • Heuristic based affinity dispatching for shared processor partition dispatching

    A mechanism is provided for determining whether to use cache affinity as a criterion for software thread dispatching in a shared processor logical partitioning data processing system. The server firmware may store data about when and/or how often logical processors are dispatched. Given these data, the operating system may collect metrics. Using the logical processor metrics, the operating system may determine whether cache affinity is likely to provide a significant performance benefit relative to the cost of dispatching a particular logical processor to the operating system.

  • METHOD AND APPARATUS FOR SCHEDULING THE PROCESSING OF COMMANDS FOR EXECUTION BY CRYPTOGRAPHIC ALGORITHM CORES IN A PROGRAMMABLE NETWORK PROCESSOR

    A method and apparatus for scheduling the processing of commands by a plurality of cryptographic algorithm cores in a network processor.

  • ALLOCATING REGISTER HALVES INDEPENDENTLY

    Register halves are allocated independently when performing register allocation during program compilation, thereby effectively doubling the number of registers which are available for allocation, which in turn may reduce spill code and improve run-time performance. When hardware registers are 64 bits wide, for example, an architecture supporting the present invention provides some number of separate hardware instructions that operate on the 32-bit high-word and/or the 32-bit low word of the hardware registers as if those 32-bit words are separate registers. Such hardware instructions are able to manipulate the register halves independently, leaving the other register half untouched. A register coloring algorithm using in the compilation process is invoked using the number of register halves, instead of the number of hardware registers.

  • PUBLISH/SUBSCRIBE BROKER MESSAGING SYSTEM AND METHOD

    A publish/subscribe broker messaging system and method for processing a data message based on a message broker scheduling algorithm. The schedulingalgorithm can be configured in association with a message broker to receive and transmit the data message associated with one or more publishers to a subscriber. The subscriber can register a subscription with respect to the message broker to receive the data message based on a selected topic. An attribute can be added to the selected topic description based on the scheduling algorithm in order to schedule the data message from the publisher with respect to the selected topic via the message broker. The data message with respect to the selected topic from the publisher can be processed sequentially and the scheduling algorithm can process other topics simultaneously. The data messages from other publishers with similar topic can also be processed simultaneously in order to transmit a high volume of message while ensuring high levels of service.

  • CHARACTERIZING DATASETS USING SAMPLING, WEIGHTING, AND APPROXIMATION OF AN EIGENDECOMPOSITION

    A method, a system, and a computer-readable medium are provided for characterizing a dataset. A representative dataset is defined from a dataset by a computing device. The representative dataset includes a first plurality of data points and the dataset includes a second plurality of data points. The number of the first plurality of data points is less than the number of the second plurality of data points. The data point is added to the representative dataset if a minimum distance between the data point and each data point of the representative dataset is greater than a sampling parameter. The data point is added to a refinement dataset if the minimum distance between the data point and each data point of the representative dataset is less than the sampling parameter and greater than half the sampling parameter. A weighting matrix is defined by the computing device that includes a weight value calculated for each of the first plurality of data points based on a determined number of the second plurality of data points associated with a respective data point of the first plurality of data points. The weight value for a closest data point of the representative dataset is updated if the minimum distance between the data point and each data point of the representative dataset is less than half the sampling parameter. A machine learning algorithm is executed by the computing device using the defined representative dataset and the defined weighting matrix applied in an approximation for a computation of a full kernel matrix of the dataset to generate a parameter characterizing the dataset.

  • METHOD FOR OPTIMIZING THE POSITIONING OF WELLS IN AN OIL RESERVOIR

    A method is disclosed for determining well placements, or drainage areas, in a hydrocarbon reservoir to facilitate operation of the reservoir. Drainage area configurations are generated randomly, by generating, for each configuration, placements for each drainage area. The placements of each drainage area are determined to optimize a quality criterion, by an iterative optimization algorithm during which for first iterations, the quality criterion is evaluated by a flow simulator, and for subsequent iterations, an approximate evaluation model of the quality criterion is constructed. The quality of the approximate model is evaluated and the quality criterion is determined by the approximate model or by the flow simulator according to the quality of this approximate model.

  • METHOD AND DEVICE FOR FILTERING ELECTRICAL CONSUMPTION CURVES AND ALLOCATING CONSUMPTION TO CLASSES OF APPLIANCES

    The invention relates to a method for analysing the electrical consumption of a plurality of electrical appliances operating on a consumption site, by filtering a demand curve representing the electrical consumption of said appliances according to time. Said method is characterised in that it comprises the following steps: before the filtering per se of the demand curve, the demand curve is recorded and digitalised in such a way as to obtain a demand curve digitalised by periods of time; a set of categories of appliances is defined, each category being defined by similar cycles of power variation according to the time; an algorithm is defined for each category of appliances, for filtering the demand curve for said category of appliances, said algorithm being able to extract the power variation cycles from the digitalised demand curve and to allocate the electrical consumption to said category of appliances; then during the filtering per se of the digitalised demand curve, the filtering algorithms for each category of appliance are used successively to identify and regroup the power variation cycles consumed by said electrical appliances, from the digitalised demand curve.

  • METHOD AND DEVICE FOR REFLEX-BASED FUNCTIONAL GAIT TRAINING

    A device and method for gait training, such as for rehabilitation of a person after a stroke is provided. In some embodiments, the device comprises a stimulator, preferably electric stimulator, for provoking a spinal cord withdrawal reflex in the person by stimulation on the person's foot in response to a control signal. Hereby, the person's leg will move and initiate a gait swing. A sensor is placed to sense movement of the leg and provide a feedback signal accordingly. A processor unit with a processor runs a control algorithm which calculates the control signal in response to the feedback signal. Thus, the method is based on a closed-loop design, and the control signal is preferably calculated for each walking step, and it is preferably based on the feedback signal obtained from the preceding walking step. Hereby reflex habituation can be accounted for. Preferably, the stimulator has a plurality of stimulator channels with electrodes placed on different sites distributed on the sole of the foot and on the heel. The feedback signal may be based on accelerometer(s), and/or gyroscope(s), and/or goinometer(s) positioned on the leg and/or foot, e.g. partly or fully integrated in an in-sole for a shoe etc.

  • CHANNEL EQUALIZER AND METHOD OF PROCESSING BROADCAST SIGNAL IN RECEIVING SYSTEM

    A channel equalizer for use in a receiving system includes an overlap unit, a first estimator, an interpolator, and a second estimator. The overlap unit overlaps a group of normal data packets including a head, a body, and a tail, and a known data region is periodically repeated in the body. The first estimator estimates CIRs of the known data regions according to a first algorithm, and the interpolator estimates CIRs of normal data regions in the body by interpolating the estimated CIRs of the known data regions. The second estimator estimates CIRs of normal data regions in the head and tail according to a second algorithm different from the firstalgorithm. A calculator calculates equalization coefficients based on the estimated CIRs and a compensator multiplies the overlapped data with the coefficients. A save unit saves the compensated data.

  • Method, Apparatus and System for Transmitting Information Bits

    A method, an apparatus, and a system for transmitting information bits, where the method for transmitting information bits includes: dividing the information bits to be transmitted into at least two groups; encoding the information bits to be transmitted in each group; modulating the coded bits obtained by the encoding to obtain modulation symbols, in which each modulation symbol is obtained by using the modulation of the coded bits in the same group; and mapping and transmitting the modulation symbols. In this way, the receiving end easily reduces the algorithm complexity, thereby ensuring the performance of the receiving end.

  • SLEEP MODE SELECTION EMPLOYING A SEMI-MARKOV DECISION PROCESS

    The disclosed subject matter relates to energy efficiency in mobile devices associated with a wireless communications environment. Power Saving Classes (PSCs) aim to reduce the power consumption of mobile devices based on the different types of traffic. Optimizing sleep mode selection schemes so as to maximize the energy efficiency while providing a QoS guarantee can be accomplished with optimization of a theoretical framework based on the semi-Markov Decision Process along with a performance evaluation on the sleep mode operation. A novel Policy Optimization algorithm is capable of finding optimized policies for a selection of different PSCs.

  • ROBUST MOTOR TORQUE PERFORMANCE DIAGNOSTICS ALGORITHM FOR ELECTRIC DRIVE SYSTEMS IN HYBRID VEHICLES

    A method to control a powertrain having an electric motor includes monitoring a torque command to the motor, predicting a motor torque for the motor based upon the torque command, monitoring an actual motor torque of the motor, comparing the actual motor torque to the predicted torque, and indicating a motor fault when the actual motor torque and the predicted torque differ by more than a calibratable threshold.

  • METHOD FOR DEFINING A SEARCH SEQUENCE FOR SOFT-DECISION SPHERE DECODING ALGORITHM

    A low complexity method for determining a search sequence of nodes for an efficient soft-decision sphere decoding algorithm for use in receivers for quadrature amplitude modulation (QAM) communication signals is achieved by determining a first member of the search sequence by rounding a received symbol (z) to a first constellation symbol (x.sub.c) of the QAM constellation, classifying the remaining constellation symbols (x.sub.i) of the QAM constellation into a plurality of sub-sets of constellation symbols having the same distance metric relative to said first constellation point (x.sub.c) according to a metric d.sub.sequ(n)=2an=max{|real(x.sub.c-x.sub.i)|,|imag(x.sub.c-x.sub.i)|}, a being a scaling factor of the constellation grid, and ordering said sub-sets of constellation symbols in ascending order of their distance metric relative to the first constellation symbol (x.sub.c), and ordering the members of each sub-set of constellation symbols that are defined by the same distance metric according to their Euclidean distances.

  • POSITIONING ALGORITHM FOR EDGE PORTION OF TOUCH PANEL AND POSITIONING SYSTEM USING THE SAME

    A positioning algorithm for edge portion of touch panel is provided. Dummy sensing lines surrounding a touch panel are provided. The x-axis and y-axis coordinate ranges of x-axis and y-axis sensing lines of the touch panel are determined. When the touch panel is touched, an x-axis sensing line, a y-axis sensing line, and a dummy sensing capacitance generated by the dummy sensing lines are located. Whether the corresponding x-axis sensing capacitance of the x-axis sensing line is smaller than or equal to the x-axis dummy sensing capacitance is determined. If so, an x-axis coordinate value is obtained according to the x-axis sensing capacitance and the dummy sensing capacitance. Whether the corresponding y-axis sensing capacitance of the y-axis sensing line is smaller than or equal to y-axis dummy sensing capacitance is determined. If so, a y-axis coordinate value is obtained according to the y-axis sensing capacitance and the dummy sensing capacitance.

  • SEQUENCING ALGORITHM FOR PLANNED DRILL HOLES

    A method for sequencing drill holes for a mobile drill rig is disclosed. The method may include receiving a hole pattern having a plurality of planned holes and generating at least a first group of parallel pathways and a second group of parallel pathways between the plurality of holes of the hole pattern. The first group of pathways may be angled relative to the second group of pathways. The method may also include selecting between the first group of pathways and the second group of pathways based on which group of pathways includes fewer total pathways. The method may further include generating a combined pathway by linking at least one pathway from the selected group of pathways to at least a second pathway from the selected group of pathways and transmitting the combined pathway to a module configured to control movement of the mobile drill rig.

  • METHOD OF MIXING EXHAUST GAS EXITING AN EXHAUST STACK OUTLET WITH COOLING AIR EXITING A COOLING PACKAGE OUTLET INCLUDING A REGENERATION CONTROL ALGORITHM AND MACHINE USING SAME

    A machine includes an internal combustion engine disposed within an engine compartment and supported on a machine frame. An exhaust stack has an inlet fluidly connected to an exhaust manifold of the internal combustion engine and an outlet in fluid communication with ambient air. A diesel particulate filter is disposed along the exhaust stack, and the machine includes an active regeneration system for regenerating the diesel particulate filter. A cooling package including at least one heat exchanger and a blower fan. The blower fan is configured to blow cooling air from the engine compartment sequentially through the at least one heat exchanger and an outlet of the cooling package. Exhaust gas exiting the exhaust stack outlet is mixed with the cooling air exiting the cooling package outlet in a high temperature zone surrounding the exhaust stack outlet to form a fluid mixture. An electronic control module is in control communication with the active regeneration system and includes a regeneration control algorithm operable to detect a speed of the blower fan.

  • APPLICATION OF PATH-FILL ALGORITHM TO TEXT LAYOUT AROUND OBJECTS

    A method including: obtaining an electronic document (ED) including a text line for placement on a page having an exclusion region (ER); obtaining a path for the page having a first subpath corresponding to a margin of the page and a second subpath corresponding to the ER on the page; calculating, using a path-fill algorithm inputting the path, a region on the page excluding the margin and the ER; selecting, on the page and after calculating the region, a line band crossing the ER on the page and having a dimension of the text line; identifying, based on an intersection of the region and the line band, a plurality of segments; and rendering the page by placing a first portion of the text line in a first segment of the plurality of segments and a second portion of the text line in a second segment of the plurality of segments.

  • COORDINATE ALGORITHM OF TOUCH PANEL

    A coordinate algorithm of a touch panel is provided, in which the touch panel includes a plurality of first-direction sensing lines and a plurality of second-direction sensing lines. The coordinate algorithm of a touch panel includes following steps. A first edge coordinate is obtained. A first coordinate compensation parameter is defined. The first edge coordinate is taken as a first base coordinate, and the first base coordinate is adjusted according to the first coordinate compensation parameter to obtain a first interpolation coordinate when an edge of the touch panel is touched.

  • Authenticating Messages Using Cryptographic Algorithm Constants Supplied to a Storage-Constrained Target

    The present invention provides for authenticating a message. A security function is performed upon the message. The message is sent to a target. The output of the security function is sent to the target. At least one publicly known constant is sent to the target. The received message is authenticated as a function of at least a shared key, the received publicly known constants, the security function, the received message, and the output of the security function. If the output of the security function received by the target is the same as the output generated as a function of at least the received message, the received publicly known constants, the security function, and the shared key, neither the message nor the constants have been altered.

  • REVERT BLEND ALGORITHM AND APPARATUS USING THE ALGORITHM

    A revert alloy is used in the manufacture of a target alloy having a different composition. The weight percent of the elemental constituents of this first alloy and a second or target alloy are obtained, and the ratio of the percentage by weight of each elemental constituent in the first alloy to the second alloy is determined. The lowest ratio is used to determine the amount of the first alloy that is melted and the necessary elemental constituents that are added to the melt to produce the desired composition of the target alloy. The melt is solidified to produce the target alloy.

  • ARCHITECTURE GUIDED OPTIMAL SYSTEM PRECISION DEFINITION ALGORITHM FOR CUSTOM INTEGRATED CIRCUIT

    Systems and methods are disclosed to automatically determine an optimal number format representation for a model or code to be implemented in a custom integrated circuit (IC) by determining a ratio of dynamic range to static range in the model or code, and selecting a floating point or a fixed point number representation based on the ratio; determining the optimal number representation format based on a cost function that includes hardware area and power cost associated with a predetermined bit precision arithmetic; automatically generating a processor architecture customized to the optimal number representation format; and synthesizing the generated processor.

  • Method and Apparatus for Depth-Fill Algorithm for Low-Complexity Stereo Vision

    A method and apparatus for depth-fill algorithm for low-complexity stereo vision. The method includes utilizing right and left images of a stereo camera to estimate depth of the scene, wherein the estimated depth relates to each pixel of the image, and updating a depth model with the current depth utilizing the estimated depth of the scene.

  • Algorithm Integrating System and Integrating Method Thereof

    The present invention discloses an algorithm integrating system and an integrating method thereof. The algorithm integrating system comprises a receiving module, an analyzing module, and a processing module. The receiving module receives at least one test algorithm. The analyzing module is connected to the receiving module and analyzes the at least one test algorithm to obtain at least one basic element from the at least one test algorithm. The processing module is connected to the analyzing module and screen out the at least one non-duplicate basic element based on the at least one basic element. Then, the processing module integrates the at least one non-duplicate basic element and generates a testing module.

  • ULTRASOUND IMAGING SYSTEM PARAMETER OPTIMIZATION VIA FUZZY LOGIC

    An ultrasound scanner is equipped with one or more fuzzy control units that can perform adaptive system parameter optimization anywhere in the system. In one embodiment, an ultrasound system comprises a plurality of ultrasound image generating subsystems configured to generate an ultrasound image, the plurality of ultrasound image generating subsystems including a transmitter subsystem, a receiver subsystem, and an image processing subsystem; and a fuzzy logic controller communicatively coupled with at least one of the plurality of ultrasound imaging generating subsystems. The fuzzy logic controller is configured to receive, from at least one of the plurality of ultrasound imaging generating subsystems, input data including at least one of pixel image data and data for generating pixel image data; to process the input data using a set of inference rules to produce fuzzy output; and to convert the fuzzy output into numerical values or system states for controlling at least one of the transmit subsystem and the receiver subsystem that generate the pixel image data.

  • Imaging Based Symptomatic Classification Using a Combination of Trace Transform, Fuzzy Technique and Multitude of Features

    A statistical (a) Computer Aided Diagnostic (CAD) technique is described for symptomatic versus asymptomatic plaque automated classification of carotid ultrasound images and (b) presents a cardiovascular risk score computation. We demonstrate this for longitudinal Ultrasound, CT, MR modalities and extendable to 3D carotid Ultrasound. The on-line system consists of Atherosclerotic Wall Region estimation using AtheroEdge.TM. for longitudinal Ultrasound or Athero-CTView.TM. for CT or Athero-MRView from MR. This greyscale Wall Region is then fed to a feature extraction processor which uses the combination: (a) Higher Order Spectra; (b) Discrete Wavelet Transform (DWT); (c) Texture and (d) Wall Variability. Another combination uses: (a) Local Binary Pattern; (b) Law's Mask Energy and (c) Wall Variability. Another combination uses: (a) Trace Transform; (b) Fuzzy Grayscale Level Co-occurrence Matrix and (c) Wall Variability. The output of the Feature Processor is fed to the Classifier which is trained off-line.

  • FUZZY KEYWORD SEARCHING

    A fuzzy, or ambiguous, keyword searching process and systems for implementing the fuzzy keyword searching process are provided. In general, one or more keyword search terms are first identified for a search. Next, a user is enabled to adjust a logical fuzziness, or logical ambiguity, for each of the one or more keyword search terms. As used herein, logical fuzziness of a keyword search term refers to the extent to which associated keywords are considered for the search. In one embodiment, the user may also be enabled to view and adjust keyword associations for each of the keyword search terms. A search is then performed based on the one or more keyword search terms and the logical fuzziness of the one or more keyword search terms, and results of the search are presented to the user.

  • METHOD AND APPARATUS FOR ENHANCING REPRESENTATIONS OF MICRO-CALCIFICATIONS IN A DIGITAL MAMMOGRAM IMAGE

    Method and apparatus for enhancing representations of micro-calcifications in a digital mammogram image. The method includes smoothing the digital mammogram image using a fuzzy smoothing technique to yield a fuzzy smoothed image. The method includes subtracting the fuzzy smoothed image from the digital mammogram image to yield a micro-calcifications enhanced image. The method includes scaling gray level values of pixels in the micro-calcifications enhanced image by a predetermined amount to provide a digital mammogram image with enhanced representations of the micro-calcifications. Apparatus for enhancing representations of micro-calcifications includes an image processing unit that uses an image acquisition unit to receive an image and a digital signal processor to process the image to provide a digital mammogram image with enhanced representations of micro-calcifications.

  • ALGORITHM ENGINE FOR USE IN A PATTERN MATCHING ACCELERATOR

    A pattern matching accelerator (PMA) for assisting software threads to find the presence and location of strings in an input data stream that match a given pattern. The patterns are defined using regular expressions that are compiled into a data structure comprised of rules subsequently processed by the PMA. The patterns to be searched in the input stream are defined by the user as a set of regular expressions. The patterns to be searched are grouped in pattern context sets. The sets of regular expressions which define the pattern context sets are compiled to generate a rules structure used by the PMA hardware. The rules are compiled before search run time and stored in main memory, in rule cache memory within the PMA or a combination thereof. For each input character, the PMA executes the search and returns the search results.

  • Outage Management Algorithm

    Techniques and systems are described that assist in predicting, diagnosing, and/or managing an incident in a utility service area. A communication system is provided in the service area to communicate with nodes of the service area. In some instances, the communication system is configured to communicate with nodes of the service area according to a hierarchy of the nodes and/or a physical location of the nodes.

  • Block Placing Tool for Building a User-Defined Algorithm for Electronic Trading

    Certain embodiments provide a block placing tool for building a user-defined algorithm for electronic trading. Certain embodiments provide for receiving by a block placing tool a selection of one or more blocks. Certain embodiments provide for receiving by a block placing tool a mapping definition including a mapping between block types and/or attributes. Certain embodiments provide for placing blocks based on a selection of blocks and a mapping definition.

  • CSF biomarker dilution factor corrections by MRI imaging and algorithm

    A method is disclosed for providing a correcting factor for the dilution of measurements of at least one biomarker in cerebrospinal fluid (CSF). The method comprises providing semi-automated measurements of the ventricular system by MRI scans using quantitative anatomical protocols, determining a measurement of biomarker levels in CSF that has been extracted, correcting the measurement of the level of said at least one biomarker'according to the ventricular size, and providing a corrected result of the measurement determined in step (b), said corrected result accounting for concentration dilution due to the change in ventricular size. The method is particularly suited for the measurement of all biomarkers found in the CSF, such as those associated with mild cognitive impairment (MCI) and Alzheimer's Disease.

  • VERIFICATION ALGORITHM FOR METAL-OXIDE RESISTIVE MEMORY

    Memory devices and methods for operating such devices are described which can effectively program the metal-oxide memory elements in an array, while also avoiding applying unnecessarily high voltage pulses. Programming operations described herein include applying a lower voltage pulse across a metal-oxide memory element to establish a desired resistance state, and only applying a higher voltage pulse when the lower voltage pulse is insufficient to program the memory element. In doing so, issues associated with applying unnecessarily high voltages across the memory element can be avoided.

  • METHOD AND SYSTEM FOR PREPARING SENSOR OUTPUT DATA OF A SENSOR ASSEMBLY FOR FURTHER PROCESSING IN AT LEAST ONE APPLICATION AND/OR BY AT LEAST ONE ALGORITHM

    A method and a system are provided for preparing sensor output data of a sensor assembly comprising at least one sensor for further processing in at least one application and/or by at least one algorithm. The method includes a configuration phase and an operational phase. The operational phase includes: Providing a data manipulation structure comprising a filter function for transforming the sensor output data into processable sensor data and at least a first memory function for storing the processable sensor data; Transforming the sensor data from the sensor assembly into processable sensor data processable by the at least one application and/or the at least one algorithm by means of the filter function; Storing the processable sensor data by means of the at least first memory function; Providing the stored processable sensor data to the at least one application and/or the at least one algorithm for further processing.

  • METHOD AND ALGORITHM FOR RANDOM HALF PITCHED INTERCONNECT LAYOUT WITH CONSTANT SPACING

    An embodiment of a system and method produces a random half pitched interconnect layout. A first normal-pitch mask and a second normal-pitch mask are created from a metallization layout having random metal shapes. The lines and spaces of the first mask are printed at normal pitch and then the lines are shrunk to half pitch on mask material. First spacers are used to generate a half pitch dimension along the outside of the lines of the first mask. The mask material outside of the first spacer pattern is partially removed. The spacers are removed and the process is repeated with the second mask. The mask material remains at the locations of first set of spacers and/or the second set of spacers to create a half pitch interconnect mask with constant spaces.

  • PHOTODIODE ARRAY WITH ALGORITHM-BASED CROSSTALK REDUCTION

    A photodiode (PD) array accurately measures incident optical power on each of the PDs in the array by eliminating the effect of crosstalk between the individual PDs. Crosstalk within the PD array is removed by measuring the current generated by each PD in the array and generating a corrected optical power value for each PD that is based on the measured current for each PD and on coupling coefficients associated with other PDs in the array. The coupling coefficients are determined during a previous calibration procedure.

  • EFFICIENT QUASI-EXACT 3D IMAGE RECONSTRUCTION ALGORITHM FOR CT SCANNERS

    A CT scanner comprises: at least one source of X-rays and a multi-row detector array of arbitrary geometry, both supported so as rotate around an axis of rotation during a scan of an object translated along the axis, wherein data for each detector is generated as a function of the X-ray energy received; and a data processor configured so as to perform resampling of the data onto curves in a virtual detector array. The curves project onto tilted lines in a virtual flat detector as to enable tangential filtering of the data.

  • METHOD OF DIVERSIFICATION OF A ROUND FUNCTION OF AN ENCRYPTION ALGORITHM

    A method of diversification of an iterative function of an encryption algorithm. During an iteration at least one parameter other than an encryption key and an input message is modified. It is particularly advantageous that the encryption algorithm is the Advanced Encryption Standard.

  • Efficient Implementation of Hash Algorithm on a Processor

    An efficient implementation of SHA-512, and similarly SHA-384, on an ARM processor. The implementation maximizes reuse of the register values between iterations so as to minimize the need to load these values from memory. This is achieved by categorizing the iterations into even and odd ones such that the sequence of computation in the even iteration is reversed in the odd iteration and the register values at the end of one iteration are consumed at the beginning of the following one.

  • Systems and Methods for Developing Computer Algorithm Solutions By Conducting Competitions

    This invention relates to a method and apparatus for providing a coding competition. In one embodiment, a method for providing a coding competition includes transmitting a coding problem to contestants, receiving computer code created by a contestant, determining a response of the computer code to test data, and evaluating the response of the computer code to the test data. In another embodiment, a method for evaluating a skill level of a contestant includes electronically communicating a coding problem to contestants, electronically receiving a software program in response to the coding problem from one of the contestants, evaluating the received software program, awarding points to the contestant based on the received software program, and determining a rating for the contestant for the competition based on the number of points awarded to the contestant.

  • Disjoint Path Computation Algorithm

    A network element implementing Multiprotocol Label Switching to automatically create an optimal deterministic back-up Label Switch Path (LSP) that is maximally disjointed from a primary LSP to provide a reliable back up to the primary LSP. The network element receives a request for a generation of an LSP, determines that the request for the generation of the LSP is for the back-up LSP, locates each link of the primary LSP in a traffic engineering database, modifies each link of the primary LSP to have a link cost significantly greater than an actual link cost to discourage use of each link of the primary LSP in the back-up LSP, executes a Constrained Shortest Path First algorithm to obtain the back-up LSP, wherein the back-up LSP has a maximum disjointedness from the primary LSP due to a modified cost of each link of the primary LSP, and returns the back-up LSP.

  • SYSTEMS AND METHODS FOR DETERMINING LOCATION OF AN ACCESS NEEDLE IN A SUBJECT

    Systems and methods for epicardial electrophysiology and other procedures are provided in which the location of an access needle may be inferred according to the detection of different pressure frequencies in separate organs, or different locations, in the body of a subject. Methods may include inserting a needle including a first sensor into a body of a subject, and receiving pressure frequency information from the first sensor. A second sensor may be used to provide cardiac waveform information of the subject. A current location of the needle may be distinguished from another location based on an algorithm including the pressure frequency information and the cardiac waveform information.

  • METHOD FOR DETECTING GESTURES USING A MULTI-SEGMENT PHOTODIODE AND ONE OR FEWER ILLUMINATION SOURCES

    A gesture sensing device includes a multiple segmented photo sensor and a control circuit for processing sensed voltages output from the sensor. The control circuit processes the sensed voltage signals to determine target motion relative to the segmented photo sensor. The control circuit includes an algorithm configured to calculate one of more differential analog signals using the sensed voltage signals output from the segmented photo sensors. A vector is determined according to the calculated differential analog signals, the vector is used to determine a direction and/or velocity of the target motion.

  • COST-SENSITIVE ALTERNATING DECISION TREES FOR RECORD LINKAGE

    Record Linkage (RL) is the task of identifying two or more records referring to the same entity (e.g., a person, a company, etc.). RL models can be based on Cost Sensitive Alternating Decision Trees (ADTree), analgorithm that uniquely combines boosting and decision trees algorithms to create shorter and easier-to-interpret linking rules. These models can be naturally trained to operate at industrial precision/recall operating points, and the shorter output rules are so clear that it can effectively explain its decisions to non-technical users via score aggregation or visualization. The models significantly outperform other baselines on the desired industrial operating points, and the improved understanding of the model's decisions led to faster debugging and feature development cycles.

  • SYSTEM AND METHOD FOR DETECTION OF VENOUS PULSATION

    In accordance with an embodiment of the present technique, there is provided methods and systems for detecting the presence of venous pulsation by adjusting the sensitivity of a detection algorithm based on a sensor characteristic and/or notifying a caregiver of the presence of venous pulsation by ceasing display of physiological parameters. An exemplary embodiment includes receiving one or more signals from a sensor, the one or more signals corresponding to absorption of light in a patient's tissue; calculating one or more physiological parameters of the patient based on the one or more signals; displaying the patient's physiological parameters; enabling detection of venous pulsation with variable sensitivity based on a location of the sensor; and suspending or terminating the display of the one or more of the patient's physiological parameters when venous pulsation is detected.

  • USE OF ORGANIC LIGHT EMITTING DIODE (OLED) DISPLAYS AS A HIGH-RESOLUTION OPTICAL TACTILE SENSOR FOR HIGH DIMENSIONAL TOUCHPAD (HDTP) USER INTERFACES

    A finger-operated touch interface system is physically associated with a visual display. The system includes a processor executing a software algorithm and an array of transparent organic light emitting diodes (OLEDs) communicating with the processor. The system operates a group of OLEDS from the OLED array in light sensing mode. These OLEDs detect light via photoelectric effect and communicate light detection measurements to the processor. The software algorithm produces tactile measurement information responsive to light reflected by a finger proximate to the OLED array, and reflected light is received by at least one OLED in the transparent OLED array and originates from a software-controlled light source. In one approach, the reflected light is modulated and the system is responsive to reflected modulated light. The processor generates a control signal responsive to the reflected light. The system can be used to implement an optical touchscreen without an RF capacitive matrix.

  • MIRROR SIGNAL IQ-IMBALANCE CORRECTION

    A system and method are provided for calibrating the IQ-imbalance in a low-IF receiver. A Test Signal can be generated in a mirror frequency and conveyed to the receiver. The power of the signal produced in the receiver from the conveyed Test Signal can be measured. In the absence of an IQ-imbalance, the Test Signal can be completely eliminated in the receiver and the corresponding measured power of the produced signal can be minimized. Accordingly, a two dimensional algorithm is described for calibrating a receiver and correcting the IQ-imbalance by adjusting the phase and gain difference between the I and Q channels in the receiver based on the measured power of the signal produced in the receiver.

  • METHOD, SYSTEM AND COMPUTER-READABLE MEDIA FOR MEASURING IMPEDANCE OF AN ENERGY STORAGE DEVICE

    Real-time battery impedance spectrum is acquired using a one-time record. Fast Summation Transformation (FST) is a parallel method of acquiring a real-time battery impedance spectrum using a one-time record that enables battery diagnostics. An excitation current to a battery is a sum of equal amplitude sine waves of frequencies that are octave harmonics spread over a range of interest. A sample frequency is also octave and harmonically related to all frequencies in the sum. A time profile of this sampled signal has a duration that is a few periods of the lowest frequency. A voltage response of the battery, average deleted, is an impedance of the battery in a time domain. Since the excitation frequencies are known and octave and harmonically related, a simple algorithm, FST, processes the time profile by rectifying relative to sine and cosine of each frequency. Another algorithm yields real and imaginary components for each frequency.

  • SYSTEM AND METHOD FOR BINARY LAYOUT RANDOMIZATION

    Disclosed herein are systems, methods, and non-transitory computer-readable storage media for binary layout randomization. A system performs binary layout randomization by loading computer code into memory and identifying a section of the computer code to randomize. A loader remaps the section of computer code to a different location in memory utilizing a remapping algorithm. The loader can shuffle sections of code in place or move sections of code elsewhere. The loader patches relative addresses to point to the updated locations in memory. After the system patches the addresses, the system executes the computer code from memory. In one embodiment, the system encrypts the computer code prior to loading the computer code into memory. The loader decrypts the encrypted computer code prior to remapping the section of computer code to a different location in memory. Optionally, the loader can decrypt the encrypted computer code after patching relative addresses.

  • SYSTEM AND METHOD FOR EXECUTING AN ENCRYPTED BINARY FROM A MEMORY POOL

    Disclosed herein are systems, methods, and non-transitory computer-readable storage media for executing encrypted computer code. A system configured to practice the method receives a request to execute encrypted computer code. In response to the request, the system identifies a portion of the encrypted computer code for execution and decrypts the portion to yield decrypted computer code. Then the system stores the decrypted computer code in a pool of memory and executes the decrypted computer code from the pool of memory. The system can store the decrypted computer code in the pool of memory based on a randomization algorithm so that identical executions of the encrypted computer code result in selections of different available memory locations within the pool of memory. Related portions can be stored non-consecutively in the pool of memory. The pool of memory can store different portions of decrypted computer code over time.

  • SYSTEMS AND METHODS FOR TIME AND SPACE ALGORITHM USAGE

    A system and method for determining suggested content and suggested content headlines for a web page. The system and method receive a request for suggested content for a web page, determine that suggested content is appropriate for the web page based on tags for the web page and tags for a suggested content headline associated with the suggested content, apply a rule to the tags of the suggested content headline, the rule based on one or more of time and location metadata, and transmit the suggested content headline for display with the web page if the rule has been satisfied.

  • Converging algorithm for real-time battery prediction

    A method predicts the battery state in "real-time", which is based on a nodal algorithmic model. Under this method, the battery is modeled as a network mesh of both linear and non-linear electrical branch elements. Those branch elements are inter-connected through a set of nodes. Each node can have several branches either originating or ending into it. The branch elements may represent loosely some particular function or region of the battery or they may serve a pure algorithmic function. The non-linear behavior of the elements may be described either algorithmically or through lookup tables. Kirchhoff's laws are applied on each node to describe the relationships between currents and voltages. The system may be connected with a battery so that it can receive measured values at the battery, and the system yields state-of-charge, state-of-health, and state-of- function signals.

  • Position-Based Step Control Algorithm for a Motion Control System

    A motion control interface device includes an FPGA configured to implement a step generation algorithm that generates step control signals for a motion device. The signals are not determined based directly on time, but instead are determined from the position of the motion device. More particularly, the step generation algorithm operates to keep track of a position fraction based on the position. The position fraction is incremented (or decremented) at each clock tick of the FPGA. The algorithm generates rising edge signals when the position fraction crosses a particular threshold value, referred to as the rising edge threshold value. Similarly, the algorithm signals direction changes when the position fraction crosses a threshold referred to as the direction change threshold value.

  • MORPHOLOGY-BASED DISCRIMINATION ALGORITHM BASED ON RELATIVE AMPLITUDE DIFFERENCES AND CORRELATION OF IMPRINTS OF ENERGY DISTRIBUTION

    Techniques for morphologic discrimination between beats of a tachyarrhythmia episode are described for selecting delivery of appropriate therapy. An exemplary method comprises nonordered binning of digitized amplitude values of signals associated with cardiac depolarizations. Monomorphic VT is discriminated from polymorphic VT without signal alignment. One exemplary method involves sensing electrical signals associated with depolarizations of a patient's heart during a tachyarrhythmia episode. The sensed electrical signals are converted to digital values and stored. The stored digital values are normalized and binned. At most, 5 pairs of beats or depolarizations are compared for morphologic similarity by determining the similarity between the binned values associated with each pair. The result of the comparison is used to select and deliver therapy to the patient.

  • Program Algorithm with Staircase Waveform Decomposed into Multiple Passes

    Programming algorithms suitable for non-volatile memory devices are presented, where the usual staircase type of waveform is decomposed into multiple passes. The same pulses are used, but their order is different, being broken down into N subsets of every N-th pulse so that there are N programming passes. For example, in a four pass version the first pass would sequentially have pulses (1, 5, 9, . . . ) of the staircase; the second pass would have pulses (2, 6, 10, . . . ); and so on for the third and fourth passes. By using a large step size for stepping up the program voltage V.sub.PGM, pre-verify and shifted verify margins for the different passes, a narrow distribution can be obtained with multiple passes. Also, in a complementary set of features, a quick pass write (QPW) can be done without the drawback of doing QPW verify by the use of shared verify levels.

  • TESTING ELECTRONIC MEMORIES BASED ON FAULT AND TEST ALGORITHM PERIODICITY

    Testing electronic memories based on fault and test algorithm periodicity. A processor unit for testing an electronic memory includes a built-in self-test (BIST) finite state machine, an address generator, a data generator, a test algorithm generation unit, a programmable test algorithm register, and a test algorithm register control unit. A memory wrapper unit for testing an electronic memory includes an operation decoder, a data comparator, and an electronic memory under test. The method includes constructing a fault periodic table having columns corresponding with test mechanisms, and rows corresponding with fault families. A first March test sequence and second March test sequence are selected according to respective fault families and test mechanisms, and applied to an electronic memory. The electronic memory under test is determined to be one of acceptable and unacceptable based on results of the first March test sequence and the second March test sequence.

  • ELECTRIC CURRENT BASED ENGINE AUTO STOP INHIBIT ALGORITHM AND SYSTEM IMPLEMENTING SAME

    A vehicle includes an engine and at least one controller. The at least one controller periodically determines an estimated current to be demanded by vehicle electrical loads during an auto stop of the engine, compares the estimated current with a threshold current, and inhibits an auto stop of the engine if the estimated current is greater than the threshold current for a predetermined period of time.

  • VOICE DATA INTEGRATED MULTIACCESS BY SELF-RESERVATION AND CONTENTION ALGORITHM

    Certain exemplary embodiments provide a method for providing multiple access to a communication channel, the method comprising: sending a reservation request of a first type into a first selected minislot of a selected frame of an uplink channel when information of a first type is to be sent, the uplink channel having a plurality of frames, each frame having a first selectable number of minislots and a second selectable number of slots, the reservation request of the first type requesting an assignment of at least one slot for transmitting information of the first type in at least one frame that is subsequent to the selected frame.

  • INTEGRATED CIRCUIT TEST OPTIMIZATION USING ADAPTIVE TEST PATTERN SAMPLING ALGORITHM

    A method of implementing integrated circuit device testing includes performing baseline testing of a first group of chips using a full set of test patterns, and for chip identified as failing, determining, a score for each test pattern in the full set. The score is indicative of an ability of the test pattern to uniquely identify a failing chip with respect to other test patterns. Following the baseline testing, streamlined testing on a second group of chips is performed, using a reduced set of the test patterns having highest average scores as determined by the baseline testing. Following the streamlined testing, full testing on a third group of chips is performed using the full set of test patterns, and updating the average score for each pattern. Further testing alternates between the streamlined testing and the full testing for additional groups of chips.

  • HASH ALGORITHM-BASED DATA STORAGE METHOD AND SYSTEM

    A hash algorithm-based data storage method and apparatus are disclosed, including: pre-configuring L number of backend storage modules and a mapping relationship between identifiers of the backend storage modules and a modulo L operation; calculating a key value of data to be stored using a hash algorithm; performing a modulo L operation on the obtained key value and, using the mapping relationship between identifiers of the backend storage modules and the modulo L operation, outputting the key value in the modulo L operation and the corresponding data to a backend storage module with a corresponding backend storage module identifier; determining a preconfigured hash table in the backend storage module does not contain data to be stored, and storing the data to be stored and the corresponding key value. By using the present invention, requirements on storage devices can be lowered and the storage efficiency can be improved.

  • APPARATUS AND METHOD FOR GENERATING ANALYSIS ALGORITHM OF ELECTROMAGNETIC FIELD GENERATOR

    An analysis algorithm generation apparatus of an electromagnetic field generator includes: a value inputting unit for receiving information on a TEM cell or GTEM cell; and an algorithm generating unit for generating an algorithm to analyze a TEM mode in a cross sectional structure of the GTEM cell or a tapered section of the TEM cell by using an associated Legendre function and a mode-matching method based on the information transmitted from the value inputting unit. The algorithm generating unit analyzes the TEM mode by dividing a space into four (left, right, upper and lower) regions, the space existing between an inner electrode and an outer wall of the cross sectional structure of the GTEM cell or the tapered section of the TEM cell.

  • ENERGY DELIVERY ALGORITHM FOR MEDICAL DEVICES

    A method for controlling an electrosurgical waveform includes the initial steps of activating an electrosurgical generator and increasing power during a first sample window and determining a direction of change in a first average impedance during the first sample window. The method also includes the steps of performing a first adjustment of power in response to the direction of change in the first average impedance during a subsequent sample window and determining a direction of change in a subsequent average impedance during the subsequent sample window in response to the first adjustment of power. The method also includes performing a subsequent adjustment of power in response to the direction of change in the subsequent average impedance, wherein the subsequent adjustment of power is reverse to that of the first adjustment of power when the direction of change in the first and subsequent average impedances is the same.

  • Longitudinal Image Registration Algorithm For Infrared Images For Chemotherapy Response Monitoring And Early Detection Of Breast Cancers

    This algorithm provides a marker-free approach to establishing the pixel correspondence among the IR images taken at different times, which is the basis for quantitatively characterizing the variation of the heat energy and patterns pixel-wise on a breast surface. The idea is to use the corner points of the heat pattern and the branch points of the skeletons of the heat pattern on the body surface as the initial fiducial points for the longitudinal IR image registration. The Thin-Plate Spline technique is used to model the nonlinear deformation between two IR images taken at two different times. Mutual information between the TPS-transformed image and the target image is employed as the metric quantifying the quality of the longitudinal IR image registration. To optimize the registration, Nelder-Mead simplex method is used to locally modify the pairings of the fiducial points in the source and target IR images to maximize the mutual information.

  • REFRESH ARCHITECTURE AND ALGORITHM FOR NON-VOLATILE MEMORIES

    Methods and systems to refresh a non-volatile memory device, such as a phase change memory. In an embodiment, as a function of system state, a memory device performs either a first refresh of memory cells using a margined read reference level or a second refresh of error-corrected memory cells using a non-margined read reference level.

  • REDUNDANT ADAPTIVE ALGORITHM FOR ELECTRICAL PRESSURE REGULATED HIGH PRESSURE TANK SYSTEMS

    A method and system for controlling a pressure regulator in a gas storage system using a pressure switch as a pressure measurement device. A controller uses supply pressure data and gas flow demand data to compute a feed-forward control term, and uses data from a pressure sensor downstream of the pressure regulator to compute a feedback control term. During normal operation, with pressure downstream of the regulator oscillating about a set point pressure, on-time and off-time periods of a pressure switch are monitored, and an adaptive control term is computed which balances on-time and off-time. If the pressure sensor fails, excessive switch on-time or off-time will be detected; in response to this, the feedback control term is disregarded, and an adaptive control term is computed which aims to restore balanced on-time and off-time of the switch, thus indicating that the actual pressure is oscillating about the set point.

  • SYNTHETIC APERTURE INTEGRATION (SAI) ALGORITHM FOR SAR IMAGING

    A method and system for detecting the presence of subsurface objects within a medium is provided. In some embodiments, the imaging and detection system operates in a multistatic mode to collect radar return signals generated by an array of transceiver antenna pairs that is positioned across the surface and that travels down the surface. The imaging and detection system pre-processes the return signal to suppress certain undesirable effects. The imaging and detection system then generates synthetic aperture radar images from real aperture radar images generated from the pre-processed return signal. The imaging and detection system then post-processes the synthetic aperture radar images to improve detection of subsurface objects. The imaging and detection system identifies peaks in the energy levels of the post-processed image frame, which indicates the presence of a subsurface object.

  • ONLINE FRAUD PREVENTION USING GENETIC ALGORITHM SOLUTION

    Online fraud prevention including receiving a rules set to detect fraud, mapping the rules set to a data set, mapping success data to members of the rules set, filtering the members of the rules set, and ordering members of the data set by giving priority to those members of the data set with a greater probability for being fraudulent based upon the success data of each member of the rule set in detecting fraud. Further, a receiver coupled to an application server to receive a rules set to detect fraud, and a server coupled to the application server, to map the rules set to a data set, and to map the success data to each members of the rules set. The server is used to order the various members of the data set by giving priority to those members of the data set with a greatest probability for being fraudulent.

  • MORPHOLOGY-BASED DISCRIMINATION ALGORITHM BASED ON RELATIVE AMPLITUDE DIFFERENCES AND CORRELATION OF IMPRINTS OF ENERGY DISTRIBUTION

    Techniques for morphologic discrimination between beats of a tachyarrhythmia episode are described for selecting delivery of appropriate therapy. An exemplary method comprises nonordered binning of digitized amplitude values of signals associated with cardiac depolarizations. Monomorphic VT is discriminated from polymorphic VT without signal alignment. One exemplary method involves sensing electrical signals associated with depolarizations of a patient's heart during a tachyarrhythmia episode. The sensed electrical signals are converted to digital values and stored. The stored digital values are normalized and binned. At most, 5 pairs of beats or depolarizations are compared for morphologic similarity by determining the similarity between the binned values associated with each pair. The result of the comparison is used to select and deliver therapy to the patient.

  • MORPHOLOGY-BASED DISCRIMINATION ALGORITHM BASED ON RELATIVE AMPLITUDE DIFFERENCES AND CORRELATION OF IMPRINTS OF ENERGY DISTRIBUTION

    Techniques for morphologic discrimination between beats of a tachyarrhythmia episode are described for selecting delivery of appropriate therapy. An exemplary method comprises nonordered binning of digitized amplitude values of signals associated with cardiac depolarizations. Monomorphic VT is discriminated from polymorphic VT without signal alignment. One exemplary method involves sensing electrical signals associated with depolarizations of a patient's heart during a tachyarrhythmia episode. The sensed electrical signals are converted to digital values and stored. The stored digital values are normalized and binned. At most, 5 pairs of beats or depolarizations are compared for morphologic similarity by determining the similarity between the binned values associated with each pair. The result of the comparison is used to select and deliver therapy to the patient.

  • WIDE-FIELD LENSLESS FLUORESCENT IMAGING ON A CHIP

    An imaging device uses a fiber optic faceplate (FOF) with a compressive sampling algorithm for the fluorescent imaging of a sample over an large field-of-view without the need for any lenses or mechanical scanning. The imaging device includes a sample holder configured to hold a sample and a prism or hemispherical glass surface disposed adjacent the sample holder on a side opposite the lower surface of the sample holder. A light source is configured to illuminate the sample via the prism or the hemispherical surface, wherein substantially all of the light is subject to total internal reflection at the lower surface of the sample holder. The FOF is disposed adjacent to the lower surface of the sample holder, the fiber optic array having an input side and an output side. The device includes an imaging sensor array disposed adjacent to the output side of the fiber optic array.

  • WIDE-FIELD LENSLESS FLUORESCENT IMAGING ON A CHIP

    An imaging device uses a fiber optic faceplate (FOF) with a compressive sampling algorithm for the fluorescent imaging of a sample over an large field-of-view without the need for any lenses or mechanical scanning. The imaging device includes a sample holder configured to hold a sample and a prism or hemispherical glass surface disposed adjacent the sample holder on a side opposite the lower surface of the sample holder. A light source is configured to illuminate the sample via the prism or the hemispherical surface, wherein substantially all of the light is subject to total internal reflection at the lower surface of the sample holder. The FOF is disposed adjacent to the lower surface of the sample holder, the fiber optic array having an input side and an output side. The device includes an imaging sensor array disposed adjacent to the output side of the fiber optic array.

  • TECHNIQUES FOR IMPROVED PEDOMETER READINGS

    Techniques are provided for improving pedometer readings. In some embodiments, motion data, such as acceleration data is detected, and a magnitude of the acceleration data, referred to as the modulus, is processed. Techniques involve performing frequency analysis on the modulus. In some embodiments, the modulus samples are counted perform frequency analysis on each complete sample set. Each complete sample set includes overlapping samples with the previous sample set. A suitable frequency analysis algorithm, such as fast Fourier transform (FFT) dominant frequency computation is performed on each sample set to determine the dominant frequency of the modulus. The dominant frequency of the modulus may be smoothed in some embodiments to remove irregularities such as spikes or periods of inactivity. In some embodiments, results of frequency analysis may be used to determine whether a detected step is a walking step or a running step.

  • DTMF SIGNALLING BETWEEN MOBILE AND SERVER

    In a method of processing an incoming sequence of one or more DTMF tones at a mobile device, the sequence is decoded to thereby identify any encoded message. Where the decoding does not identify a message, at least applying an error correction algorithm to the sequence to identify a message. Where the algorithm fails to correct the sequence, the sequence is compared to messages currently expected by the mobile device. If a message is not identified, a negative acknowledgement message may be sent. At a server, upon receipt of a negative acknowledgement message, it is determined if a message was sent to the mobile device in a previous pre-determined time window. If so, the message is re-sent. The server repeatedly sends certain messages to a mobile device until an acknowledgement message indicating receipt of the message by the mobile device is received.

  • PROCESSES AND SYSTEMS FOR TRAINING MACHINE TYPESETS FOR CHARACTER RECOGNITION

    Processes and systems for training machine vision systems for use with OCR algorithms to recognize characters. Such a process includes identifying characters to be recognized and individually generating at least a first set of templates for each of the characters. Each template comprises a grid of cells and is generated by selecting certain cells of the grid to define a pattern that correlates to a corresponding one of the characters. Information relating to the templates is then saved on media, from which the information can be subsequently retrieved to regenerate the templates. The templates can be used in an optical character recognition algorithm to recognize at least some of the characters contained in a marking.

  • PROCESSES AND SYSTEMS FOR TRAINING MACHINE TYPESETS FOR CHARACTER RECOGNITION

    Processes and systems for training machine vision systems for use with OCR algorithms to recognize characters. Such a process includes identifying characters to be recognized and individually generating at least a first set of templates for each of the characters. Each template comprises a grid of cells and is generated by selecting certain cells of the grid to define a pattern that correlates to a corresponding one of the characters. Information relating to the templates is then saved on media, from which the information can be subsequently retrieved to regenerate the templates. The templates can be used in an optical character recognition algorithm to recognize at least some of the characters contained in a marking.

  • CALIBRATING ALGORITHMS FOR DETERMINING ELECTRICAL LOAD AND LIFESTYLE CHARACTERISTICS

    An apparatus, system, and method are disclosed for calibrating algorithms for determining electrical load and lifestyle characteristics. A model creation module creates an electrical usage model that includes an electrical device usage model for each electrical load assumed to be at simulated premises (an assumed load set). The simulated premises include characteristics from actual premises within an area serviced by an electric utility. A simulation module simulates a number of simulated electrical usages for a number of assumed load sets at the simulated premises. A load prediction module determines if a particular type of load is present within each simulated premises using a load prediction algorithm that includes algorithm parameters. An accuracy module determines an accuracy of the load prediction algorithm and an adjustment module adjusts the algorithmparameters of the load prediction algorithm in response to the determined accuracy.

  • ITERATIVE PATTERN GENERATION ALGORITHM FOR PLATE DESIGN PROBLEMS

    A method to generate a plurality of groups each including at least one of a plurality of elements. The method includes selecting at least one candidate element from the plurality of elements as a candidate to be included in a group, determining whether or not to generate the group including the at least one candidate element selected in the selecting step, based on an element evaluation value associated with each of the at least one candidate element selected in the selecting step, provided that a determination is made to generate the group in the determining step, generating the group including the at least one candidate element selected in the selecting step, and weighting the element evaluation value of each of the at least one element according to how many times the each element is included in already-generated groups to reflect the weighted element evaluation value in next group generation.

  • ALGORITHM FOR DETECTING ACTIVATION OF A PUSH BUTTON

    The invention relates to an algorithm for detecting activation of a tactile pressure sensor having a mechanic structure that includes the steps of: (a) measuring periodically an input quantity (V0; f0) of the sensor, when it is not pressed, the period being set according to sensor dynamic requirements; (b) computing a current idle quantity (Vidle; fidle) depending on the input quantity (V0; f0) measured at step a); (c) computing an activation threshold (.DELTA.VP; .DELTA.fP) based on a quantity characterization of the sensor mechanic structure and depending on the idle quantity (Vidle; fidle) defined at step b); (d) comparing the sensor input quantity (V0; f0) with the last defined idle quantity (Vidle; fidle) increased by the activation threshold (.DELTA.VP; .DELTA.fP) computed in step c) in order to determine whether the sensor is pressed or not.

  • CHEST FOLLOWING ALGORITHM FOR AUTOMATED CPR DEVICE

    A method for automated CPR is disclosed. The method comprises controlling a position of a compression element during movement of the compression element from a first starting position (P0) of a first compression cycle to a first compression position (P1) corresponding to a first compression depth and back to a rest position of the compression element, and after the rest position has been reached, controlling a force exerted on the compression element until a second compression cycle starts. A computer program product comprises a non-transitory computer-usable medium having control logic stored therein for causing a transceiver to execute a method for automated CPR.

  • SIGNAL PROCESSING UNIT EMPLOYING A BLIND CHANNEL ESTIMATION ALGORITHM AND METHOD OF OPERATING A RECEIVER APPARATUS

    A receiver apparatus receives a transmit signal through a plurality of transmission channels, wherein each transmission channel is described by its channel vector. A sparseness evaluation unit (127) may obtain a sparseness measure containing sparseness information for previously estimated frequency-domain channel vectors. From the plurality of receive signals, an estimator unit (120) estimates updated channel vectors for the transmission channels by applying an iterative blind channel estimation algorithm that may consider a change of the sparseness measure, out-of-band energy information and/or signal-to-noise information and cross-relations between pairs of receive signals. A combining unit (130) may combine the receive signals on the basis of combining coefficients derived from the estimated channel impulse responses for a pre-selected diversity combining scheme to obtain a combined receive signal representing an estimation of the transmit signal. The receiver apparatus employs an improved blind channel estimation approach.

  • REDUCED COMPLEXITY NON-BINARY LDPC DECODING ALGORITHM

    A custom decoding algorithm is introduced, in connection with a corresponding decoding structure, to resolve many complexity and large memory requirements of known decoders. A system. A variable node forms a confidence vector of four components, one component for each state of a memory cell, and passes the current primary component (e.g., the largest) to one or more check nodes. The check nodes calculate a temporary component and corresponding index based on all components received from the variable nodes, which they pass back to the respective variable nodes. The variable node updates the confidence vector based on the temporary nodes received from respective check nodes, and determines the correct state for corresponding memory cell based on which component in the confidence vector is currently the primary component.

  • METHOD AND SYSTEM FOR AUTHENTICATING ENTITY BASED ON SYMMETRIC ENCRYPTION ALGORITHM

    A method and a system for authenticating an entity based on a symmetric encryption algorithm are provided. The method includes the following steps: 1) an entity A sends an authentication request message to an entity B; 2) after receiving the authentication request message, the entity B sends an authentication response message to the entity A; 3) the entity A determines the validity of the entity B according to the received authentication response message. The implementation cost of the system can be reduced by using the authentication according to the invention.

  • ALGORITHM FOR NARRATIVE GENERATION

    A system comprises a physiologic sensing circuit configured to generate physiologic data for a subject and a processing circuit. The processing circuit includes a data parsing circuit configured to parse the physiologic data to identify one or more physiologic events and a report generation circuit. The report generation circuit is configured to associate narrative text with the identified physiologic events according to a text generating rule and generate a narrative report for the identified physiologic events using the narrative text.

  • ENHANCED MULTI-CORE BEAMFORMER ALGORITHM FOR SENSOR ARRAY SIGNAL PROCESSING

    Techniques and systems are disclosed for implementing multi-core beamforming algorithms. In one aspect, a method of implementing a beamformer technique includes using a spatial filter that contains lead-fields of two simultaneous dipole sources rather than a linear combination of the two to directly compute and obtain optimal source orientations and weights between two highly-correlated sources.

  • IMAGING SYSTEM SUBJECT SUPPORT MOTION ALGORITHM(S)

    An imaging system (400) includes a subject support (412) configured to carry a subject being imaged in an examination region of the imaging system and a subject support controller (418) that positions the subject support and hence the subject in the examination region for scanning the subject based on a motion algorithm which reduces subject support vibration during scanning relative to a trapezoidal or s-curve motion algorithm, for a given translation duration and a given translation distance.

  • TARGET DETECTION SIGNAL PROCESSOR BASED ON A LINEAR LOG LIKELIHOOD RATIO ALGORITHM USING A CONTINUUM FUSION METHODOLOGY

    A method including collecting physical measurement data from a sensor. The physical measurement data is converted to radiance data. The radiance data includes a plurality of radiance data points. A detection score is generated by processing the radiance data using a discriminant function. The detection score includes a plurality of detection score points corresponding to the plurality of radiance data points. The discriminant function is derived by a fusion technique using a linear log likelihood ratio principle. A detection map is generated by applying a threshold to the detection score. The detection map includes a plurality of detection map points corresponding to the plurality of radiance data points, each detection map point of the plurality of detection map points includes one of a target-indicating value and a clutter-indicating value. A presence or an absence of a target is determined from the detection map.

  • CSF Biomarker Dilution Factor Corrections by MRI Imaging and Algorithm

    A method is disclosed for providing a correcting factor for the dilution of measurements of at least one biomarker in cerebrospinal fluid (CSF). The method comprises providing semi-automated measurements of the ventricular system by MRI scans using quantitative anatomical protocols, determining a measurement of biomarker levels in CSF that has been extracted, correcting the measurement of the level of said at least one biomarker according to the ventricular size, and providing a corrected result of the measurement determined in step (b), said corrected result accounting for concentration dilution due to the change in ventricular size. The method is particularly suited for the measurement of all biomarkers found in the CSF, such as those associated with mild cognitive impairment (MCI) and Alzheimer's Disease.

  • METHOD FOR JOINT OPTIMIZATION OF SCHEDULE AND RESOURCE ALLOCATION BASED ON THE GENETIC ALGORITHM

    The invention relates to the technical field of wireless communication, and provides a method for joint optimization of schedule and resource allocation based on a genetic algorithm, which is applied in a CoMP communication system. The method includes steps of: S1, encoding chromosome; S2, initializing setting; S3, computing fitness value; S4, determining whether the optimal solution is better than an elite: if yes, updating the elite and executing S5, and if no, turning to S5; S5, determining whether a predetermined generation of population has been generated or not, if no, executing S6, otherwise, turning to S8; S6, participating reproduction process to generate two offspring chromosome individuals; S7, determining whether a predetermined number of offspring chromosome individuals have been generated, if yes, turning to S3 to compute again; otherwise keeping on reproduction; S8, performing schedule and resource allocation according to a solution corresponding to the elite. Under the condition of satisfying schedule limitation and power limitation, the method can, by uniting schedule and resource allocation, efficiently optimize system performance with less computing complexity.

  • DISTRIBUTED INTERFERENCE MANAGEMENT ALGORITHM

    A method, a computer program product, and an apparatus are provided. In a first configuration, an AP receives a transmission request from a UE in a communication link with the AP. The AP determines whether to yield a transmission request response to the transmission request based on one or more transmission requests received from at least one communication link with at least one other AP, but not from UEs in communication links with the AP. In a second configuration, an AP receives a transmission request response from a UE in a communication link with the AP. The AP determines whether to yield a data transmission to the UE based on one or more transmission requests responses received from at least one communication link with at least one other AP, but not from UEs in communication links with the AP.

  • REDUCING APPLICATION STARTUP TIME THROUGH ALGORITHM VALIDATION AND SELECTION

    An application developer is able to select from a library only those algorithms or functions that are needed. When the application starts on a device, only those algorithms will perform a self-test thereby significantly reducing application start-up time. This is in lieu of the conventional practice of having all the algorithms in library perform a self-test at application runtime. The application developer, by changing parameters to certain functions in the library, can add and remove algorithms as the application changes. The service provider providing the library can still make a generic offering of the full library to its customers and, through the new functionality, facilitate application developer selection of algorithms that are needed. This reduction of start-up time is particularly beneficial on mobile devices where processing power may be limited.

  • REDUCING APPLICATION STARTUP TIME THROUGH ALGORITHM VALIDATION AND SELECTION

    An application developer is able to select from a library only those algorithms or functions that are needed. When the application starts on a device, only those algorithms will perform a self-test thereby significantly reducing application start-up time. This is in lieu of the conventional practice of having all the algorithms in library perform a self-test at application runtime. The application developer, by changing parameters to certain functions in the library, can add and remove algorithms as the application changes. The service provider providing the library can still make a generic offering of the full library to its customers and, through the new functionality, facilitate application developer selection of algorithms that are needed. This reduction of start-up time is particularly beneficial on mobile devices where processing power may be limited.

  • METHOD, COMPUTER PROGRAM, AND ALGORITHM FOR COMPUTING NETWORK SERVICE VALUE PRICING BASED ON COMMUNICATION SERVICE EXPERIENCES DELIVERED TO CONSUMERS AND MERCHANTS OVER A SMART MULTI-SERVICES (SMS) COMMUNICATION NETWORK

    A system and method for providing multi-services within a communication network according to various exemplary embodiments can include storing, in a database of a computer, user-defined sets of rules and instructions for providing multi-services to end user devices connected to a communication network comprising a Hybrid Fiber-Wireless (HFW) network having policy management capabilities. The system and method can receive, at one or more processors, the user-defined sets of rules and instructions from a plurality of end users via a plurality of end user devices. The system and method can configure a virtual network for each end user within the communication network using the policy management capabilities based on the user-defined sets of rules and instructions provided by each end user. The user-defined sets of rules and instructions define provisioning and delivery of resources and services provided by the communication network to the end user.

  • INFERRING QUALITY IN UT CALLS BASED ON REAL-TIME BI-DIRECTIONAL EXPLOITATION OF A FULL REFERENCE ALGORITHM

    A method, computer program product, and computer system for inferring quality of unified telephony calls based on real-time bi-directional exploitation of a full reference algorithm. A client copy of an audio file may be received from a client device associated with a unified telephony call. The client copy of the audio file may be compared to a local copy of the audio file using a reference algorithm. A quality of service associated with the client device may be determined based upon, at least in part, a difference between the client copy of the audio file and the local copy of the audio file.

  • METHOD, DEVICE AND PROCESSING ALGORITHM FOR MULTIPLE AND NOISE ELIMINATION FROM MARINE SEISMIC DATA

    Computing device, computer instructions and method for simultaneously denoising and attenuating multiples in seismic data recorded with seismic receivers. The method includes receiving the seismic data, wherein the seismic data includes a pressure P component and a vertical Z component; separating the seismic data into up-going U wave-fields and down-going D wave-fields; calculating an up-down deconvolution R based on the up-going U and the down-going D wave-fields; generating a multiple model M based on the up-down deconvolution R; and adaptively subtracting the multiple model M from the pressure P component to obtain a corrected pressure P.sub.free component from which simultaneously the noise and the multiples were removed. A multiple is a wave-field that propagates from a source to a receiver and experiences more than one reflection.

  • AUTOMATED SCRATCH DETECTION SYSTEM AND SIGNAL PROCESSING ALGORITHM FOR THE STUDY OF PRURITUS IN ANIMALS

    The invention provides a method for automated assessment of pruritus comprising detecting movement of a band located on a limb of a subject animal so as to obtain a signal associated with the detection movement, processing the signal associated with the detected movement through an algorithm configured to establish a scratch movement trigger, and translating the processed signal into scratch counts.

  • INSTRUCTIONS PROCESSORS, METHODS, AND SYSTEMS TO PROCESS BLAKE SECURE HASHING ALGORITHM

    A method of an aspect includes receiving an instruction indicating a first source having at least one set of four state matrix data elements, which represent a complete set of four inputs to a G function of a cryptographic hashing algorithm. The algorithm uses a sixteen data element state matrix, and alternates between updating data elements in columns and diagonals. The instruction also indicates a second source having data elements that represent message and constant data. In response to the instruction, a result is stored in a destination indicated by the instruction. The result includes updated state matrix data elements including at least one set of four updated state matrix data elements. Each of the four updated state matrix data elements represents a corresponding one of the four state matrix data elements of the first source, which has been updated by the G function.

  • EXPERT SYSTEM FOR DETECTING SOFTWARE SECURITY THREATS

    An instance of a vulnerability risk management (VRM) module and a vulnerability management expert decision system (VMEDS) module are instantiated in a cloud. The VMEDS module imports scan results from a VRM vulnerability database and saves them as vulnerabilities to be reviewed in a VMEDS database. The VMEDS module converts vulnerabilities into facts. The VMEDS module builds a rule set in the knowledge base to verify whether certain vulnerabilities are false positives. Rules related to a vulnerability are received in plain English from a web-based front-end application. The VMEDS module tests each rule against all of the facts using the Rete algorithm. The VMEDS module executes the action associated with the rule derived from the Rete algorithm. The VMEDS module stores the results associated with the executing of the action in the VMEDS database and forwards the results to the VRM module.

  • Slot-Based Transmission Synchronization Mechanism in Wireless Mesh Networks

    Methods, apparatuses and systems directed to synchronizing transmissions among parent and child routing nodes in a hierarchical wireless mesh network. In one implementation, the present invention employs a time slot scheduling algorithm to coordinate communications between wireless nodes of a hierarchical tree. In one implementation, the present invention provides a wireless mesh network where slot scheduling information propagates throughout the mesh, while individual nodes in the mesh compute their respective time slot schedules based on this information and the current state of the network. In one such implementation, a parent routing node computes its slot schedule and transmits certain parameters to its child nodes (as opposed to the schedule itself). The child node(s) then iterates the same scheduling function based on the parameters passed to it to determine the slots with which it should communicate to its parent node and its child nodes.

  • METHODS AND SYSTEMS FOR THREE DIMENSIONAL OPTICAL IMAGING, SENSING, PARTICLE LOCALIZATION AND MANIPULATION

    Embodiments include methods, systems, and/or devices that may be used to image, obtain three-dimensional information from a scence, and/or locate multiple small particles and/or objects in three dimensions. A point spread function (PSF) with a predefined three dimensional shape may be implemented to obtain high Fisher information in 3D. The PSF may be generated via a phase mask, an amplitude mask, a hologram, or a diffractive optical element. The small particles may be imaged using the 3D PSF. The images may be used to find the precise location of the object using an estimation algorithm such as maximum likelihood estimation (MLE), expectation maximization, or Bayesian methods, for example. Calibration measurements can be used to improve the theoretical model of the optical system. Fiduciary particles/targets can also be used to compensate for drift and other type of movement of the sample relative to the detector.

  • METHOD FOR OPERATING A WIRELESS NETWORK, A WIRELESS NETWORK AND A DEVICE

    Method for operating a wireless network, wherein at least one MIMO (Multiple Input Multiple Output) group of different stations will be constructed by a grouping algorithm based on a grouping metric for providing a MIMO group of different stations addressable simultaneously in space by a base station using MIMO techniques and meeting a definable level of performance quality, the grouping metric being based on an SINR (Signal-to-Interference and Noise Ratio) experienced by each station within the MIMO group. The method includes: computing an SNR (Signal-to-Noise Ratio) that a new station would experience without any interference when added to an existing MIMO group; computing an SINR estimate by correcting the SNR with the sum of spatial correlations between the new and each of the stations already present in the existing MIMO group; and using the SINR estimate for deciding whether the new station can be added to the existing MIMO group.