Telecom Italia S.p.A. Patent applications |
Patent application number | Title | Published |
20160142180 | IMPROVED RECEIVER FOR WIRELESS COMMUNICATIONS NETWORKS - A receiver receiving in a cell at least first and second data streams included in at least first and second signals. The receiver includes: a first estimating unit configured to receive the first and second signals and provide an estimate of first data on the first data stream; a regenerating unit configured to provide a regenerated first data stream based on the first data estimate and attenuation of first radio channels transmitting the first data stream; a second estimating unit configured to provide an estimate of second data on the second data stream based on the regenerated first data stream, on the first and second signals, on attenuation of second radio channels transmitting the second data stream, and on inter/intra-cell interference; and first and second extractions units configured to extract first and second information within the first and second data based on the estimates of the first and second data. | 05-19-2016 |
20160127902 | MOBILE DEVICE AUTHENTICATION IN HETEROGENEOUS COMMUNICATION NETWORKS SCENARIO - A method and device for authenticating a user of a communication device accessing an online service. The online service is accessible over a data network and is provided through a service platform. The communication device is connected to a mobile phone network and to the data network. The communication device includes an interface software application configured to interact with the service platform through the data network for fruition of the online service, and a messaging function configured to send messages through the mobile phone network. A user-side authentication application is provided at the communication device, a provider-side authentication application is provided at the service platform, and an authentication control function is provided in communication relationship with the provider-side authentication application and with the mobile phone network. | 05-05-2016 |
20160125261 | IMAGE ANALYSIS - A method for processing an image is proposed. The method comprises identifying a first group of keypoints in the image. For each keypoint of the first group, the method provides for identifying at least one corresponding keypoint local feature related to said each keypoint; for said at least one keypoint local feature, calculating a corresponding local feature relevance probability; calculating a keypoint relevance probability based on the local feature relevance probabilities of said at least one local feature. The method further comprises selecting keypoints, among the keypoints of the first group, having the highest keypoint relevance probabilities to form a second group of keypoints, and exploiting the keypoints of the second group for analysing the image. The local feature relevance probability calculated for a local feature of a keypoint is obtained by comparing the value assumed by said local feature with a corresponding reference statistical distribution of values of said local feature. | 05-05-2016 |
20160113028 | METHOD FOR SCHEDULING RADIO RESOURCES - A method for allocating resource blocks of a transmission frame on a cellular network. The cellular network includes a cluster of antennas and a master unit of the cluster. Each antenna of each cluster is configured to provide radio coverage over a corresponding cell to exchange data with corresponding user equipment in communication with the antenna. During the transmission frame the antennas of the cluster are configured to be selectively activated and muted according to a plurality of cluster muting conditions. | 04-21-2016 |
20160105353 | PERFORMANCE MEASUREMENT OF A LINK OF A PACKET-SWITCHED COMMUNICATION NETWORK - A method for performing a performance measurement of a link between two nodes of a communication network. Before starting a measurement, measurement mode information including start time and packet transmission rate are provided to both nodes. At the start time, a first node generates and transmits to the other node a packet flow including packets with transmission times determined by the start time and packet transmission rate. The packet flow is divided into alternating blocks transmitted during even and odd block periods. At each block period, while the packet flow is received, a variable indicative of its behaviour is updated by using the measurement mode information and detected information on reception of the packet flow. Then, a parameter indicative of a performance of the packet flow during the block period is calculated using the value reached by the variable at the end of the block period. | 04-14-2016 |
20160066332 | ESTIMATING SIGNALING TRAFFIC IN MOBILE NETWORKS - A method upgrading a core section of a packet switched mobile network, includes: a) collecting information about a maximum signaling transaction amount managed by nodes of the core section with respect to active data connection established between user equipment and the packet switched mobile network, and calculating a corresponding active users parameter based on the collected information; b) retrieving an indication of how the maximum signaling transaction amount managed by the nodes is distributed among user equipment attached to the packet switched mobile network, and calculating a corresponding activity parameter based on the retrieved indication; c) calculating a forecasted number of user equipment which potentially can attach to the network in a future predetermined period; d) calculating a signaling traffic estimation based on the active users parameter, the activity parameter, and the forecasted number of user equipment, e) setting up the core section based on the calculated signaling traffic estimation. | 03-03-2016 |
20150341205 | METHOD FOR GUARANTEEING SERVICE CONTINUITY IN A TELECOMMUNICATION NETWORK AND SYSTEM THEREOF - A method providing service continuity of a telecommunication network, wherein a first node of the network receives a service request sent by a client computer to a first service server providing the service, the first service server accessing the network by the first node, the method including: storing a local copy of data packets related to the received service request; starting a server state verification procedure to check an operative state of the first service server; and transmitting the data packets to a second service server if the server state verification procedure detects a failure in the operative state of the first service server, the second service server being configured to act as a backup server for the service to be provided. | 11-26-2015 |
20150334732 | METHOD AND SYSTEM FOR SCHEDULING RADIO RESOURCES IN CELLULAR NETWORKS - A method for scheduling radio resource allocation among active flows within a wireless communication network. The method includes, at each working period of the scheduling method; for each active flow, checking presence of priority data to be transmitted within the current working period. Each active flow having priority data to be transmitted within the current working period is classified as a priority active flow. The remaining active flows are classified as non-priority active flows, the non-priority active flows having non-priority data that need not to be transmitted within the current working period. Radio resources are allocated among the priority active flows, and corresponding priority data are transmitted over the respective allocated resources. After completing priority data transmission, the radio resources are allocated among the non-priority active flows and corresponding non-priority data are transmitted over the respective allocated radio resources until the end of the current working period. | 11-19-2015 |
20150334635 | HETEROGENEOUS CELLULAR NETWORKS - A wireless communication network including a first transceiver station for transmitting first signals over a first area coverage and over a first transmission bandwidth, and a second transceiver station selectively activatable/de-activatable. The second transceiver station is operable to broadcast, when de-activated, a beacon signal identifying the second transceiver station, the beacon signal having a beacon frequency at edges of the first transmission bandwidth. The beacon signal is detectable by a user equipment for inferring presence of the second transceiver station. The first transceiver station is configured to receive a response signal from a user equipment based on the detected beacon signal, and to schedule activation of the second transceiver station based on the received response signal. | 11-19-2015 |
20150333849 | METHOD FOR ESTIMATING THE ELECTRIC FIELD STRENGTH IN A CELLULAR COMMUNICATION NETWORK - A method for estimating the electric field strength associated to a radio wave emitted by an electromagnetic source of a cellular radio communication network within an area. The method includes: identifying a set of obstacles; determining at least one of: a direct visibility polygon of points in line of sight with the source; a reflection visibility polygon of points reachable by the wave after reflection by the obstacles; a diffraction visibility polygon of points reachable by the wave after diffraction by the obstacles. The visibility polygons are associated to respective values of the electric field computed therein. The method further includes: subdividing the area into pixels; for each pixel, determining if it belongs to at least one of the visibility polygons; and in the affirmative, determining the electric field strength at the pixel as a value proportional to the electric field computed at the at least one visibility polygon. | 11-19-2015 |
20150332008 | Method and System for Providing a Telecare Service - A method is disclosed for providing a telecare service to a patient. According to the method, at least one sensor installed in a domestic environment of the patient detects a datum relating to either the domestic environment or an interaction between patient and domestic environment. Based on the detected datum, an anomaly in the domestic environment or in the interaction between patient and domestic environment is detected. Then, a predefined question uniquely associated with the detected anomaly is selected for generating a questionnaire to be submitted to the patient, with the purpose of determining the cause of the detected anomaly. Based on the patient's reply it is determined if the detected anomaly is a false anomaly and, in the affirmative, the predefined question associated to such false anomaly is excluded from the next questionnaire(s), even if the anomaly persists. | 11-19-2015 |
20150331559 | Selection System for an Interactive Display - A system for selecting, through a mobile device provided with accelerometer sensors, items of lists that can be displayed on a visual display of an interactive display system, is provided. The system includes a receiver located at a surface of a user interaction station distinct from the visual display and adapted to wirelessly receive data from the mobile device when in short range communication with the mobile device. The system further comprises a processor adapted to collect acceleration data received through the receiver and generated by the accelerometer sensors in response to movements of the mobile device carried out when the mobile device is in short range communication with the receiver. The processor is further adapted to associate the collected acceleration data with corresponding selection values over a selection scale. The processor is also adapted to control the interactive display system to select items based on the selection values. | 11-19-2015 |
20150324855 | METHOD AND SYSTEM FOR PROVIDING ADVERTISEMENT TO A USER OF A COMMUNICATION NETWORK - Disclosed is a method for providing advertisement to a user of a communication network. An advertisement database stores an association between the identifier of a further user and at least one visual advertisement associated with and selected by the further user. When a communication session is set up in the communication network between the user and the further user, an advertisement manager uses the identifier of the further user for retrieving from the advertisement database a visual advertisement selected amongst the visual advertisements associated with the further user. The advertisement manager then transmits the selected visual advertisement to the user for display on a display of the user device. | 11-12-2015 |
20150208425 | UPLINK INTERFERENCE MITIGATION IN HETEROGENEOUS MOBILE NETWORKS - A method for controlling a heterogeneous wireless network ( | 07-23-2015 |
20150109953 | Time Measurement on a Packet Flow in a Packet-Switched Communication Network - A method is provided for performing a time measurement on a packet flow to be transmitted from a first node to a second node of a communication network. The method includes calculating a medium transmission time parameter indicative of an average of transmission time parameters relating to packets transmitted during a given block period; calculating a medium reception time parameter indicative of an average of reception time parameters relating to the same packets; and calculating a medium time measurement indicative of an average performance of the packet flow during the block period using the medium transmission time parameter and the medium reception time parameter. | 04-23-2015 |
20150071073 | APPLICATION DATA FLOW MANAGEMENT IN AN IP NETWORK - Disclosed herein is a method for serving an aggregate flow in a communication network node, the aggregate flow including a plurality of individual flows. The method includes identifying in the aggregate flow, based on serving resources allocated to the network node, individual flows that may be served without substantial detriment to perceived performance, and serving the identified individual flows with priority in respect of the remaining individual flows in the aggregate flow. The method allows the presence of individual flows that may not be served without substantial detriment to perceived performance due to shortage of serving resources to be notified to an external control entity. | 03-12-2015 |
20150036936 | IMAGE ANALYSIS - A method for processing an image including: identifying a first group of keypoints in the image; for each keypoint of the first group, identifying at least one corresponding keypoint local feature related to the each keypoint; for the at least one keypoint local feature, calculating a corresponding local feature relevance probability; calculating a keypoint relevance probability based on the local feature relevance probabilities of the at least one local feature; selecting keypoints, among the keypoints of the first group, having the highest keypoint relevance probabilities to form a second group of keypoints, and exploiting the keypoints of the second group for analyzing the image. The local feature relevance probability calculated for a local feature of a keypoint is obtained by comparing the value assumed by the local feature with a corresponding reference statistical distribution of values of the local feature. | 02-05-2015 |
20150016723 | METHOD AND SYSTEM FOR COMPARING IMAGES - A method comparing first and second images, including: identifying and matching first and second keypoints in the first and second images; arranging a distribution of values of a calculated plurality of first distance ratios in a histogram; determining a number of correct keypoint matches, including: determining a matrix, each matrix element corresponding to a respective pair of keypoint matches with a value corresponding to a difference between a value of the histogram including a distance ratio of the respective pair of keypoint matches and an outlier probability density value weighted by a parameter; determining the parameter value such that the matrix dominant eigenvector is equal to a vector with a first value if the pair of keypoint match is correct and a second value if the pair of keypoint match is incorrect; determining the number of correct keypoint matches based on the dominant eigenvalue associated to the dominant eigenvector. | 01-15-2015 |
20140369218 | MEASUREMENT ON A DATA FLOW IN A COMMUNICATION NETWORK - A method performing a measurement on a data flow at a node of a communication network, the data flow including data units transmitted during first and second block periods marked by respective first and second marking values, the first and second block periods alternating in time. The method includes, at the node, during a current block period: a) determining a first parameter relating to the data units received at the node during a preceding block period; b) receiving from a further node of the transmission path a first data structure including a second parameter relating to data units transmitted to the node during the preceding block period; c) processing the first parameter and the second parameter for providing a result of the measurement on the data flow; and d) transmitting to a still further node of the transmission path a second data structure including the first parameter. | 12-18-2014 |
20140363078 | METHOD AND SYSTEM FOR IMAGE ANALYSIS - A method for processing an image, including: identifying a group of keypoints in the image; for each keypoint, calculating a corresponding descriptor array including plural array elements, each array element storing values taken by a corresponding color gradient histogram of a respective sub-region of the image in the neighborhood of the keypoint; for each keypoint, subdividing the descriptor array in at least two sub-arrays each including a respective number of elements of the descriptor array, and generating a compressed descriptor array including a corresponding compressed sub-array for each of the at least two sub-arrays, each compressed sub-array obtained by compressing the corresponding sub-array by vector quantization using a respective codebook; exploiting the compressed descriptor arrays of the keypoints for image analysis. For each keypoint of the group, the subdividing is based on correlation relationships among color gradient histograms with values stored in the elements of the descriptor array of each keypoint. | 12-11-2014 |
20140359782 | DYNAMIC PSEUDONYMIZATION METHOD FOR USER DATA PROFILING NETWORKS AND USER DATA PROFILING NETWORK IMPLEMENTING THE METHOD - A users' data profiling network implementing a method of dynamic pseudonymization of users for ensuring user privacy, including: receiving at a data node new input data related to a user along with an associated new user pseudonym and an old user pseudonym; in the data node, finding user data record, corresponding to the received new input data, having stored therein a dynamic input user pseudonym equal to the old user pseudonym received together with the new input data or to one user pseudonym; temporarily storing, in the found user data record, the new input data; setting the dynamic input user pseudonym stored in the user data record equal to the last received new user pseudonym associated with the received input data related to the user; computing and storing an output user data profile in the user data record, and then erasing accumulated new input data from the user data record. | 12-04-2014 |
20140355540 | SCHEDULING ALGORITHM FOR WIRELESS COMMUNICATION NETWORKS - A method scheduling resources allocation within a wireless communications network including at least one network cell including a central unit providing coverage over the network cell and managing at least one transmission frame for putting the central unit into communication with at least one user equipment. The method includes: retrieving input parameters including, for each user equipment, a channel quality parameter indicating a measured/estimated channel quality based on actual network cell conditions; applying a de-contextualization function to each channel quality parameter for obtaining a corresponding atomic channel quality parameter indicating channel quality de-contextualized from the actual network cell conditions; performing a scheduling algorithm providing a binary allocation matrix indicating each scheduled physical resource block, transmission frame and user equipment; and applying a contextualization function to the allocation matrix obtaining transport block size data usable by the scheduled transmission frame for transport blocks transmissions from or towards each scheduled user equipment. | 12-04-2014 |
20140334519 | SYSTEM AND METHOD FOR TEMPERATURE MONITORING IN A ROOM - A method for monitoring a temperature of a survey surface in a room. The method includes: providing a number of temperature sensors coupled to the survey surface; receiving from the number of temperature sensors respective temperature values; applying an extrapolation model to the received temperature values and extrapolating an extrapolated thermographic scan of the survey surface; and monitoring the temperature of the survey surface on the basis of the extrapolated thermographic scan. | 11-13-2014 |
20140286306 | Method and System for Controlling Mobility in a Communication Network, Related Network and Computer Program Product Therefor - A communication network includes at least one mobile terminal and a plurality of home agents to supply communication services to the mobile terminal. In the network, an authentication, authorization and accounting (AAA) platform is configured for reallocating the supply of the communication services to the mobile terminal from a first home agent to a second home agent of the plurality. | 09-25-2014 |
20140241164 | APPARATUS AND METHOD FOR SELECTIVELY DELAYING NETWORK DATA FLOWS - A control system managing data flows between a sender data processor and a recipient data processor. The data flows originate at the recipient data processor and pass through at least one telecommunications network gateway. The control system includes: a data flow identifier operable to discriminate data packets, sent by the sender data processor to the recipient data processor, as belonging to different data flows depending on respective software applications from which the data flows are originated; and an acknowledgement packet delayer operable to detect acknowledgment packets sent by the recipient data processor for acknowledging receipt of corresponding data packets received from the sender data processor, to discriminate among the acknowledgment packets depending on the data flow to which the acknowledgment packets pertains, and to selectively delay forwarding of the acknowledgment packets to the sender data processor, the selectively delaying depending on the data flow to which the acknowledgment packets relate. | 08-28-2014 |
20140206377 | INTER-OPERATOR SPECTRUM SHARING CONTROL, INTER-OPERATOR INTERFERENCE COORDINATION METHOD, AND RADIO RESOURCE SCHEDULING IN WIRELESS COMMUNICATION SYSTEMS - An inter-operator radio resource sharing method for sharing radio resources between two or more radio communication systems each controlled by a respective operator and configured to control respective proprietary radio resources and to provide respective served user equipments with radio communication services. The inter-operator radio resource sharing method: determines, by each radio communication system, a bandwidth of respective shared radio resources belonging to the respective proprietary radio resources based on a traffic load related to guaranteed-quality radio communication services requested by the respective served user equipments; signals, by each radio communication system, the respective shared radio resources to other radio communication systems; and provides, by each radio communication system, the respective served user equipments with the radio communication services on the respective proprietary radio resources and on the shared radio resources signalled by other radio communication systems. | 07-24-2014 |
20140160975 | MEASUREMENT ON DATA TRAFFIC IN A COMMUNICATION NETWORK - A method for performing a measurement on data traffic at a node of a communication network. The node includes an input interface and an output interface. The input interface receives first packets and checks whether they are marked. If a first packet is marked, a global input parameter is updated. A partial input parameter is also updated, provided the first packet is addressed to the output interface. The output interface receives second packets, which include at least part of the first packets, and checks whether they are marked. If a second packet is marked, a partial output parameter is updated, provided the second packet is received from the input interface. Further, a global output parameter is updated. The method further performs a measurement on the data traffic based on: global input parameter, partial input parameter, global output parameter, and partial output parameter. | 06-12-2014 |
20140094186 | POWER CONSUMPTION MANAGEMENT IN A RADIO ACCESS NETWORK - A method for managing power consumption of a radio access network. The method includes: defining a cluster including at least two radio resource units of the radio access network; defining a parameter indicative of a performance of the cluster and of a power consumption of the cluster, the parameter being expressed as a function of traffic throughputs carried by the radio resource units of the cluster; calculating optimum traffic throughputs as values of the traffic throughputs carried by the radio resource units of the cluster which optimize the parameter; and distributing traffic amongst the radio resource units of the cluster such that the radio resource units of the cluster carry the calculated optimum traffic throughputs. | 04-03-2014 |
20140039825 | AREA MONITORING SYSTEM AND CORRESPONDING METHOD FOR OPERATING THE SAME - A monitoring system monitoring an environmental condition of an area by measuring an environmental quantity, including: a static monitoring section including plural static sensor units each configured to collect first measure data relating to the environmental quantity in respective portions of the area; a mobile monitoring section including at least one robot configured to move within the area to collect second measure data relating to the environmental quantity in a portion of the area surrounding the robot; and a central unit communicating with the static sensor units and robot to perform: conditioned to assessing an anomalous environmental condition from first measure data collected by at least one static sensor unit, commanding the robot to operate according to anomaly routines, and conditioned to assessing an anomalous environmental condition from second measure data collected by the robot, commanding at least one static sensor unit to operate according to anomaly routines. | 02-06-2014 |
20140036865 | METHOD FOR DATA PACKET SCHEDULING IN A TELECOMMUNICATION NETWORK - A method scheduling data packets and control information in a telecommunication network for transmission in a group of OFDM symbols available in a transmission time interval. A set of the data packets to be scheduled is first selected by a scheduler, which then searches control solutions for scheduling control information associated to the set of data packets in a predetermined number of OFDM symbols of the OFDM symbol group. The scheduler searches data solutions for scheduling the selected data packets in other OFDM symbols available. The scheduler repeats searches of data and control solutions considering different sets of data packets and different numbers of OFDM symbols for scheduling control information. Finally, the scheduler schedules data packets and control information according to a scheduling solution, wherein control information is scheduled according to a control solution and data packets are scheduled according to a data solution associated to the control solution. | 02-06-2014 |
20140009347 | TWO-POLARIZATION SWITCHED-BEAM ANTENNA FOR WIRELESS COMMUNICATION SYSTEMS - An antenna device including: a first antenna assembly configured to receive first radiofrequency signals polarized according to a first polarization; a second antenna assembly configured to receive second radiofrequency signals polarized according to a second polarization orthogonal to the first polarization; and a radiofrequency signal handling assembly coupled with the first and second antenna assemblies, and configured to handle the received first radiofrequency signals separately from the received second radiofrequency signals. | 01-09-2014 |
20130336200 | LINK SCHEDULING ALGORITHM FOR OFDMA WIRELESS NETWORKS WITH RELAY NODES - A method scheduling link activations within a wireless communications network including at least one network cell including a base station providing radio coverage over the network cell and at least one relay node putting the base station into communication with a user equipment within the network cell over an access link. The relay node communicates with the base station over a backhaul link. The method includes estimating, for the relay node, an access link capacity according to status information indicative of a status of the user equipment associated with the relay node, estimating a backhaul link capacity of the relay node according to the status information, and scheduling, for the relay node, either a backhaul link activation or an access link activation such that one of the backhaul link and access link is activated, in a predetermined time interval, based on a comparison between the access capacity and backhaul capacity. | 12-19-2013 |
20130329826 | LTE SCHEDULING - A method executed in a wireless communication network including at least one base station associated to a corresponding area transmitting/receiving data to/from corresponding user terminals located within the area. The method generates a user-rate matrix for each base station. Each element of the user-rate matrix provides a corresponding score, in terms of achievable rate, to a user terminal or group of user terminals within the corresponding area when a transmission is made to/from the user terminal or group of user terminals, respectively, from/to the base station by employing a selected transmission mode. The method further processes the elements of the user-rate matrix to create a scheduling list sorting the elements by a decreasing score, and associating to each user terminal a corresponding selected transmission mode based on the scheduling list for the transmission/reception of data to/from the base station. | 12-12-2013 |
20130308861 | METHOD AND SYSTEM FOR COMPARING IMAGES - A method for comparing a first image with a second image. The method identifies first keypoints in the first image and second keypoints in the second image and associates each first keypoint with a corresponding second keypoint to form a corresponding keypoint match. For each pair of first keypoints, the method further calculates the distance therebetween for obtaining a corresponding first length. Similarly, for each pair of second keypoints, the method calculates the distance therebetween for obtaining a corresponding second length. The method further calculates a plurality of distance ratios; each distance ratio is based on a length ratio between a selected one between a first length and a second length and a corresponding selected one between a second length and a first length, respectively. | 11-21-2013 |
20130301422 | METHOD FOR COORDINATED TRANSMISSION IN A PLURALITY OF CELLS OF A WIRELESS COMMUNICATION SYSTEM - A method for coordinated transmission in a plurality of cells of a wireless communication system, wherein a user equipment triggers coordinate transmission of a plurality of cells if it detects an interference condition between signals received by the plurality of cells, the user equipment detecting the interference condition based on a radio quality metric dynamically set by the network and triggering coordinate transmission by transmitting a trigger signal to at least a cell of the plurality of cells. A radio equipment and a user equipment for use in a wireless communication system can implement coordinated transmission with the method. | 11-14-2013 |
20130282909 | METHOD AND SYSTEM FOR CONTROLLING CONTENT DISTRIBUTION, RELATED NETWORK AND COMPUTER PROGRAM PRODUCT THEREFOR - A method is disclosed herein for controlling distribution of media contents over a network, wherein the contents are distributed by making the contents available at surrogate servers. The method includes the steps of identifying additional contents eligible for distribution; defining a set of categories; identifying for each category at least a reference content; associating the additional contents with the predefined categories based on semantics affinity with the reference content, the semantics affinity being calculated as the distance of each of the additional contents to the at least a reference content; selecting at least one of said predefined categories; and making at least one of the additional contents associated with said selected predefined category available for distribution at the surrogate servers. | 10-24-2013 |
20130281100 | METHOD FOR THE PREDICTION OF COVERAGE AREAS OF A CELLULAR NETWORK - A method predicting coverage area of a radiocommunications network including plural network cells distributed over a geographic area. The method includes calculating by simulation an irradiated electromagnetic field irradiated by a radio base station of the network in plural measure locations within the geographic area corresponding to respective expected positions of a user terminal. The calculating includes, for each measure location, calculating a basic transmission curve indicative of a basic attenuation of a radioelectric signal strength in the measure location, and associating to the basic transmission curve at least one correction factor for refining the radioelectric signal strength basic attenuation by taking account of shielding effects on the radioelectric signal strength due to obstacles to the propagation of the radioelectric signal. | 10-24-2013 |
20130276033 | METHOD AND SYSTEM FOR SYNCRONIZING ELECTRONIC PROGRAM GUIDES - A method for generating a time scheduling of a contents stream distributed to plural terminals. The contents stream is segmented in consecutive segments, each segment defining a corresponding program. The method includes: receiving auxiliary metadata including a planned time scheduling of the content stream which has been set in advance and monitoring at least a portion of a segment of the contents stream to extract corresponding content features therefrom, generating a corresponding fingerprint based on the extracted content features and assessing at least one among an actual start time and an actual end time of such segment based on a comparison between the fingerprint and a reference fingerprint associated with such segment, and updating the planned time scheduling based on the assessed at least one among the actual start time and actual end time to generate a time scheduling synchronized with the contents stream. | 10-17-2013 |
20130275906 | MAGNETIC-LIKE USER INTERFACE FOR COMBINING OBJECTS - A methodology for assisting a user in a combination of objects, e.g. functional blocks, through an intuitive user interface which can simulate effect of magnets, and including: representing a high affinity degree between two blocks in a magnetic-like style as a simulated attraction giving a feedback to the user. Such attraction feedback can be represented in different ways, from a simple visual representation to a proper mechanical feedback conveyed to the user through the input device used for making the block selection, e.g. a mouse, a track point, or a joystick. | 10-17-2013 |
20130265191 | METHOD AND SYSTEM FOR LOCALIZING MOBILE COMMUNICATIONS TERMINALS - A method of determining a geographic position of a user terminal including a receiver of signals of a global navigation satellite system, the method including the user terminal: performing pseudo-range measurements related to a plurality of signals received from transmitters of the global navigation satellite system; calculating a first estimated position thereof by a weighted least square method; calculating post-fit residuals for the first estimated position; comparing the calculated post-fit residuals to a first threshold and: in case the first threshold is exceeded, calculating a second estimated position using a Monte-Carlo method, otherwise retaining the first estimated position as the geographic position of the mobile communications terminal. | 10-10-2013 |
20130223274 | MEASUREMENT ON A DATA FLOW IN A COMMUNICATION NETWORK - Disclosed is a method for performing a measurement (namely, a data loss measurement and/or a time measurement) on a data flow to be transmitted in a communication network. The method includes: upon transmission of the data flow, during first block periods that alternate in time with second block periods, marking each data unit of the data flow by setting a feature thereof to a first value and updating a first parameter; upon reception of the data flow, checking the feature for each received data unit and updating a second parameter when the feature is equal to the first value; while transmission and reception are performed, processing a timer for determining whether a current block period is one of the second block periods and, in the affirmative, providing current values of the first and second parameters; and performing a measurement using the current values of the first and second parameters. | 08-29-2013 |
20130212102 | METHOD FOR ACCESSING INFORMATION RELATED TO AN ENTITY - A method accesses information related to a reference entity through a display device. The method includes providing an ontology describing the reference entity and entities, the reference entity and the entities being classes of the ontology or being arranged into classes, the classes having respective properties; receiving information for identifying the reference entity; and calculating a network of entities out of the entities, the entities having relationships with the reference entity, according to the properties. The method further includes identifying portions available on an area of the display device, according to the classes of the ontology; assigning the entities to at least one of the display area portions; selecting a display area portion out of the display area portions; and displaying, on the display device, images and/or text data for indicating at least part of the entities of the network assigned to the selected display area portion. | 08-15-2013 |
20130165076 | NETWORK ADAPTED TO MANAGE DIFFERENT MOBILE TELEPHONY SERVICES - A mobile network is adapted to provide a first mobile telephony service to a first group of subscribers and a second mobile telephony service to a second group of subscribers. The mobile network includes a home location register; at least one switching equipment cooperating with the home location register for providing the first mobile telephony service to the first group of subscribers; at least one adapter node cooperating with the home location register and with the switching equipment for providing the second mobile telephony service to the second group of subscribers. | 06-27-2013 |
20130132008 | SYSTEM AND METHOD FOR THE AUTOMATIC IDENTIFICATION OF ELECTRIC DEVICES/APPLIANCES - A system for automatic identification of a device or appliance includes: at least one sensor associatable with the device or appliance to be identified, and able to monitor an evolution in time of an electrical quantity indicative of device or appliance energy consumption; an analyzer communicating with the at least one sensor including receiving reports of the monitored electrical quantity, and automatically identifying the device or appliance by analyzing the evolution in time of the monitored electric quantity. The analyzing calculates a cross-correlation between the evolution in time of the monitored electric quantity and at least one reference pattern representative of at least one sample device or appliance; and when more than one sample device or appliance is included in a candidate list, identifies the device or appliance by performing a selection among the candidates based on characteristic parameters related to the respective calculated cross-correlations. | 05-23-2013 |
20130054652 | METHOD FOR EXPLORING A CATALOG OF DIGITAL INFORMATION CONTENTS - A method for exploring a catalog of digital information contents through a user apparatus is provided with a display screen, in which the catalog of digital information contents is structured according to at least two hierarchical tree structures, each including a respective hierarchy of nodes, each node corresponding to a respective category of digital information contents. The method includes: selecting a first sub-hierarchy of nodes of a first one of the at least two hierarchical tree structures, the first sub-hierarchy of nodes being built beginning from a selected category of the first hierarchical structure by selecting at least one among a first number of categories at immediately higher hierarchical levels in comparison to the selected category and a second number of categories at immediately lower hierarchical levels in comparison to the selected category; selecting a second sub-hierarchy of nodes of a second one of said at least two hierarchical tree structures, the second sub-hierarchy of nodes being built beginning from a destination category of the second hierarchical structure, the destination category being in relationship with the selected category, by selecting at least one among a first number of categories at immediately higher hierarchical levels in comparison to the destination category and a second number of categories at immediately lower hierarchical levels in comparison to the destination category; displaying on the screen icons representative of the categories of the first and of the second sub-hierarchy and respective relationships between the categories; and exploring the categories of the first and of the second sub-hierarchy reacting to commands imparted by the user through said user apparatus. | 02-28-2013 |
20130034040 | METHOD AND SYSTEM FOR WIRELESS COMMUNICATIONS, CORRESPONDING NETWORK AND COMPUTER PROGRAM PRODUCT - A multiple-user multiple input-multiple output wireless communication system uses a set of multiple subcarriers arranged in plural subsets or resource blocks. Precoding of signals transmitted from a base station to user terminals involves acquiring channel state information on the connection channel between the base station and user terminals in the plurality. Channel quality indicators are detected with user terminals for respective subsets of resource blocks to produce user/resource block pairs having associated channel quality indicators. The user/resource block pairs are subjected to selection as a function of the channel quality indicators associated therewith so that precoding is performed by acquiring channel state information exclusively for the user/resource block pairs surviving the selection as a function of the channel quality indicators and, possibly, other selection steps as a function of other parameters, such as, speed, maximum bit rate, and direction of arrival or angular spread in a multiple-stage selection process. | 02-07-2013 |
20120299932 | METHOD FOR THE CALCULATION OF THE BOUNDING BOX OF VECTORIAL GRAPHIC SHAPES - Method for determining the bounding box of a computerized graphic shape comprising one or more primitives described in vectorial mode, wherein the bounding box is calculated by applying analytical mathematical formulas to the vectorial description of the primitives constituting the shape without preliminarily performing a phase of drawing and displaying of the shape through resolution of the vectorial primitives that compose it. | 11-29-2012 |
20120287883 | ADAPTIVE SCHEDULING DATA TRANSMISSION BASED ON THE TRANSMISSION POWER AND THE NUMBER OF PHYSICAL RESOURCE BLOCKS - A method of scheduling data transmission of transport blocks in an Orthogonal Frequency-Division Multiple Access communication system, wherein each of the transport blocks is transmitted with a respective transmission format and transmission power in a set of physical resource blocks in the frequency domain. The method identifies the relationship between transmission power and the block error rate for a set of transmission formats, and evaluates alternative transmission formats and different numbers of physical resource blocks for at least one of the transport blocks. The method determines a set of alternative transmission formats with different numbers of physical resource blocks, and determines a value indicating the total power difference required to transmit the transport block, while maintaining a target block error rate. The transport block is then transmitted with the alternative transmission format and different number of physical resource blocks if the value indicates that the total transmission power is less. | 11-15-2012 |
20120286728 | WIRELESS ENERGY TRANSFER SYSTEM AND METHOD FOR FEEDING AN ELECTRIC LOAD - A wireless energy transfer system and an associated method for feeding an electric load are provided. The system includes a transmitter which includes a generator adapted to generate a radiofrequency signal at a first frequency and a first resonant circuit adapted to transmit the radiofrequency signal; and a receiver adapted to receive the radiofrequency signal and comprising a second resonant circuit. The second resonant circuit is adapted to be located in the non-radiative near field generated by the first resonant circuit, and the transmitter includes frequency sweeping functionality, which imposes on the radiofrequency signal generator a cyclic excursion of the first frequency in the neighborhood of a nominal frequency of the generator so that, when the first frequency matches the resonant frequency of the second resonant circuit, a non-radiative energy transfer occurs. | 11-15-2012 |
20120284775 | METHOD FOR PROVIDING IP SERVICES TO A USER OF A PUBLIC NETWORK - A method for providing IP services to a user of a public network is disclosed. The user accesses the public network using a user equipment which supports a first set of IP services. The network provides a second set of IP services. A third set of IP services, included in a first set and second set of IP services, is identified and the user is allowed to access a plurality of IP services of a third set. A public network suitable to implement the method is also disclosed. | 11-08-2012 |
20120275333 | PERFORMING A TIME MEASUREMENT IN A COMMUNICATION NETWORK - A method for performing a time measurement on a data flow transmitted from a transmitter to a receiver of a communication network is provided. The method comprises: at the transmitter, dividing the data flow in first and second time alternating blocks of data units, transmitting them, increasing a transmission counter while the first blocks are transmitted and setting a transmission timestamp to a current time when a predetermined data unit of each first block is transmitted; at the receiver, receiving the first and second blocks, increasing a reception counter while the first blocks are received and setting a reception timestamp to a further current time when the predetermined data unit of each first block is received; and at a management server, periodically detecting values of the transmission counter, the reception counter, the transmission timestamp and the reception timestamp, and using them for performing the time measurement. | 11-01-2012 |
20120252498 | METHOD AND SYSTEM FOR NOTIFYING PROXIMITY OF MOBILE COMMUNICATION TERMINALS USERS - A method for notifying proximity of users of mobile communication terminals, comprising: a) having a mobile communication terminal obtaining from a remote server data suitable to be used by the mobile communication terminal for deriving a distance between a position of another mobile communication terminal and the mobile communication terminal; b) having the mobile terminal determining, based on said obtained data, whether the position of the other mobile communication terminal falls within a predetermined distance range; and c) in case the position of the other mobile communication terminal falls within said predetermined distance range, having the mobile communication terminal generating a notification for the user of the mobile communication terminal. A corresponding system is also disclosed. | 10-04-2012 |
20120250678 | METHOD OF SCHEDULING TRANSMISSION IN A COMMUNICATION NETWORK, CORRESPONDING COMMUNICATION NODE AND COMPUTER PROGRAM PRODUCT - Data streams are transmitted from a node towards a receiver in a communication network in the form of data packets for playout via a reproduction buffer at the receiver. The data packets are arranged in a scheduling queue and dropped from the scheduling queue if their sojourn time in the queue exceeds a given drop deadline. The reproduction buffer is emulated at the node in order to determine respective playout values for the data packets which are indicative of expected playout instants for the data packets by the reproduction buffer at the receiver. The drop deadlines are assigned to the data packets as a function of the respective playout values determined via the reproduction buffer as emulated at the node. | 10-04-2012 |
20120238263 | RADIO RESOURCE SCHEDULING FOR INTRA-SYSTEM INTERFERENCE COORDINATION IN WIRELESS COMMUNICATION SYSTEMS - A radio resource scheduling method for scheduling radio resources used for communications in a radio communication system includes user equipment configured to communicate with transceiver stations on the radio resources. The transceiver stations are configured to exchange coordination messages concerning radio resources affected by intra-system interference. The radio resource scheduling method includes allocating to each user equipment served by a transceiver station a corresponding radio resource and a corresponding transmission power level to communicate with the serving transceiver station. Allocating is based on coordination messages exchanged by the serving transceiver station. | 09-20-2012 |
20120221647 | SHARING OF DIGITAL CONTENTS IN P2P NETWORKS EXPLOITING LOCALIZATION DATA - A method for enabling sharing of content files among nodes of a P2P network is provided. The P2P network comprises sub-networks each including a respective plurality of nodes capable of storing content files. Each sub-network has an associated corresponding hash table for indexing content files stored in the nodes. The hash table is distributed among at least some of the nodes of the sub-network. For each content file stored in at least one node, the hash table comprises a corresponding node list of the sub-network nodes which store the content file. The method comprises associating each node of the sub-network listed in the node list corresponding to a content file with localization data indicating the localization of the node within the sub-network. The localization data defines a corresponding preferential list of the nodes storing the content file for downloading the content file by a requesting node. | 08-30-2012 |
20120221646 | CACHING OF DIGITAL CONTENTS IN P2P NETWORKS - A method for enabling sharing of content files among nodes of a P2P network is provided. The P2P network comprises sub-networks each including a respective plurality of nodes capable of storing content files. Each sub-network has an associated corresponding hash table for indexing the content files stored in the nodes of the sub-network. The hash table is distributed among at least some of the nodes of the sub-network. The method comprises, for each content file stored in at least one node of a sub-network, storing in the hash table associated with the sub-network a criticality index providing an indication of the degree of sharing of the content file among the nodes of the sub-network. The method causes a node to cache at least one content file for sharing with other nodes of the sub-network based on the criticality index of the at least one content file. | 08-30-2012 |
20120008750 | TOOL FOR TESTING DISTRIBUTION CABINETS OF A TELEPHONE NETWORK - An apparatus such as a tool for testing lines at a network distribution cabinet allows the connection to the network of subscriber twisted pairs. The apparatus includes inputs for the connection of probes adapted to contact pairs of connection terminals of the distribution cabinet for the connection of the subscriber twisted pairs; a line test unit adapted to perform tests on the lines under the control of a programmable control unit; at least one memory for storing the results of the tests. The control unit is adapted to automatically perform a test of the lines terminating at the distribution cabinet according to a predetermined sequence, and to store the results of the test in a structured form in which a unique association is established between a physical position of each pair of terminal clamps in the distribution cabinet and the results of the test conducted on the corresponding lines. | 01-12-2012 |
20110314135 | DISTRIBUTED SYSTEM FOR STORING DIGITAL DATA - A distributed system for storing digital data is disclosed. The distributed system includes a portable storage device suitable for being connected to a terminal, at least one storage server and a dispatching server. The dispatching server is suitable for retrieving accessibility information indicating that the at least one storage server is accessible by the portable storage device. The portable storage device is suitable for, when connected to the terminal, sending identification information to the dispatching server. The dispatching server is suitable for, upon reception of the identification information, using the identification information for retrieving the accessibility information and for sending the accessibility information to the portable storage device. The portable storage device is suitable for, upon reception of the accessibility information from the dispatching server, using the accessibility information for establishing a connection with the at least one storage server and for allowing the terminal to access it. | 12-22-2011 |
20110310745 | METHOD AND SYSTEM FOR SIMULATING THE PHYSICAL LEVEL OF A RADIO NETWORK - A method of simulating transmission of data from a transmitter to a receiver in a radio communications network, the method including calculating an average amount of data to be transmitted to the receiver in a considered transmission time interval based on a relationship between an interferential condition assumed to be experienced at the receiver and a data transmission throughput, the relationship being determined by a link-level simulation of the link between the transmitter and the receiver. | 12-22-2011 |
20110289000 | METHOD FOR MANAGING ON-LINE COMMERCIAL TRANSACTIONS - Method for managing on-line commercial transactions between a user and a seller of goods/services that interact through respective data processing systems communicating through a data network. The method includes: upon receipt, from a computer system of an institute issuing payment cards, of a request of transaction with debit on the payment card of the user coming from the seller of goods/services, having the computer system of the institute issuing the payment cards preliminarily requesting a confirmation of the transaction to the buyer through a mobile telephony terminal of the buyer, and, in case the confirmation of the transaction is received, having the computer system of the institute issuing the payment cards processing the transaction, whereas in case the confirmation of the transaction is denied, not processing the transaction and informing the seller. Both or one of the request of confirmation of the transaction or the confirmation of the transaction are sent through communication over a data channel with the mobile telephony terminal of the buyer. | 11-24-2011 |
20110276633 | METHOD AND SYSTEM FOR DATA MANAGEMENT IN PEER-TO- PEER NETWORK - A method for managing storage of data objects in a peer-to-peer system including a plurality of peer entities is provided. For each data object to be stored into the peer-to-peer system, the method including establishing a group of peer entities so that the group meets a stability requirement according to predetermined stability rules, storing the data object into each peer entity of the group, and each peer entity of the group generating and maintaining a group list associated with the data object, which includes the peer entities of the group. | 11-10-2011 |
20110269397 | Radio Coverage Extender for a Personal Area Network Node Embedded in a User Communications Terminal - A radio coverage extender is provided for extending the radio range of a wireless network node embedded in a user terminal, for example a ZigBee node integrated on the SIM card of a mobile phone. The radio coverage extender may include: a radio signal repeater operable to receive radio signals from the wireless network node and to retransmit the received signals externally to the user terminal, and a power supply module operable to scavenge electrical energy from electromagnetic fields in which it happens to be immersed and to store the scavenged electrical energy for supplying the stored power to the radio signal repeater. The radio coverage extender is adapted to be included in a user terminal, for example it can be a flexible, pliable film attachable to a user terminal battery. | 11-03-2011 |
20110268033 | METHOD FOR DISTRIBUTED MOBILE COMMUNICATIONS, CORRESPONDING SYSTEM AND COMPUTER PROGRAM PRODUCT - A method of arranging exchange of signals between user terminals in a cellular communication system and at least one base station. The base station includes a central unit and a plurality of remote units. The signals are exchanged between the central unit and the remote units as aggregated signals for plural user terminals. The signals are processed at the remote units as distinct signals each associated with a respective one of the plural user terminals. | 11-03-2011 |
20110267964 | ANOMALY DETECTION FOR PACKET-BASED NETWORKS - Disclosed herein is an anomaly detection method for a packet-based network which includes several network resources, also called network-related software objects. The method includes monitoring the network resources of the packet-based network, ordering the monitored network resources according to a given ordering criterion, and detecting an anomaly in the packet-based network based on the ordered network resources. In particular, detecting an anomaly includes forming a detection feature vector based on the ordered network resources, and feeding the detection feature vector to a machine learning system configured to detect an anomaly in the packet-based network based on the detection feature vector. The detection feature vector includes detection feature items related to corresponding monitored network resources, and arranged in the detection feature vector depending on the ordering of the corresponding monitored network resources. Conveniently, the machine learning system is a one-class classifier, preferably a one-class Support Vector Machine (OC-SVM). | 11-03-2011 |
20110267402 | PARALLEL INK JET PRINTING DEVICE AND RELATIVE MANUFACTURING - The printing device ( | 11-03-2011 |
20110266362 | ACRYLIC ADHESIVE FOR ASSEMBLING ELEMENTS CONTACTING BIOLOGICAL SUBSTANCES - The present invention relates to acrylic adhesive composition comprising a mixture of at least one polyol tri(meth)acrylate monomer and at least one polyalkylene glycol mono(meth)acrylate monomer for assembling elements made of plastic materials, like PMMA or SAN, or inorganic material, like glass or metals, employed for manufacturing of devices for the distribution or containment of biological substances, like proteins, enzymes, antibodies, antigens, DNA, and the like. The present invention also relates to devices for the distribution or containment of biological substances assembled with the above mentioned acrylic adhesive composition, and particularly thermal or piezoelectric ejecting devices, and biochip microarray, as well as to a method for assembling thereof. | 11-03-2011 |
20110264699 | METHOD AND SYSTEM FOR CONTENT CLASSIFICATION - A processing method for classification ( | 10-27-2011 |
20110263265 | Method of Dimensioning Radio Access Networks, Corresponding System and Computer Program Product - Downlink and uplink communication resources to ensure network coverage and satisfy assigned traffic requirements in a communication network are allocated by setting a given balance of downlink and uplink communication resources while leaving a part of downlink and uplink communication resources remaining to be allocated. Downlink cell radius and uplink cell radius values are then determined which ensure network coverage with the resources as previously allocated. An effective cell radius is then selected as the smaller of the downlink and uplink cell radius and then a first check is made as to whether the effective cell radius selected satisfies the assigned traffic requirements. If not, the effective cell radius is updated. If so, a further check may be made as whether the resources remaining to be allocated for downlink and uplink have a difference in excess of a given amount. If yes, the procedure is repeated by setting an updated balance of downlink and uplink communication resources reducing that difference. If not, the communication resources are allocated on the basis of the current balance. | 10-27-2011 |
20110262139 | METHOD FOR LOCALIZING AN OPTICAL TERMINATION DEVICE IN A PASSIVE OPTICAL NETWORK - A method for localizing an optical network termination (ONT) of a passive optical network is disclosed. The passive optical network comprises an optical line terminal (OLT) and an optical distribution network (ODN) having a plurality of optical links. The ONT is connectable to the OLT by a given optical link of the optical distribution network. The method includes the steps of detecting that the ONT has been connected to the OLT by an optical link of the optical distribution network; determining length information indicative of a length of the optical link; comparing the length information with a reference length information indicative of a length of the given optical link; and if the length information matches the reference length information, localizing the ONT by confirming that it is connected to the OLT by the given optical link. | 10-27-2011 |
20110255440 | Measurement of Data Loss in a Communication Network - A method for measuring data loss of a data flow in a communication network is provided. The method includes, at a transmitting node: marking each data unit of the data flow for dividing the data flow in blocks so that: data units of a same block have a feature with a same value, while data units of contiguous blocks have the feature with different values; increasing a first counter when the feature has the first value, and a second counter when the feature has the second value; and transmitting the data flow to a receiving node. The method includes, at the receiving node, for each data unit: checking the feature, increasing a third counter when the feature has the first value, and increasing a second counter when the feature has the second value. The method includes calculating data loss based on detected values of first, second, third and fourth counters. | 10-20-2011 |
20110254896 | INKJET PRINTHEAD, IN PARTICULAR FOR SEWING/EMBROIDERING MACHINES, A METHOD FOR MAKING SAID INKJET PRINTHEAD, AND A METHOD FOR COLORING A THREAD - An inkjet printhead, in particular for sewing/embroidering machines, includes a support structure; a plurality of firing cells included in the support structure, each firing cell being adapted to eject ink through a respective nozzle for coloring a thread to be used in a sewing/embroidering machine; a guide element, provided on the support structure, for guiding the thread in a position facing said nozzles. Also disclosed are a sewing/embroidering machine including the printhead and a method for making the printhead. | 10-20-2011 |
20110238825 | APPLICATION DATA FLOW MANAGEMENT IN AN IP NETWORK - Disclosed herein is a two-level, network-based application control (NBAC) architecture for monitoring services provided via a packet-based network. The NBAC architecture includes a Network Trigger System provided at a network level to analyze data flows relating to services to be monitored to detect occurrence of configurable events, and to generate and send event reports; and a Usage Status Engine provided at a control level to configure the Network Trigger System to detect occurrence of events of interest, and to receive and process the event reports from the Network Trigger System to monitor the services. | 09-29-2011 |
20110235638 | METHOD AND SYSTEM FOR MULTICAST PATH SWITCHING, CORRESPONDING NETWORK AND COMPUTER PROGRAM PRODUCT - Multicast signals are transmitted from a source to user terminals via multicast paths through a set of nodes in a network. A first node, such as a ‘last-hop’ router, may send toward the source corresponding join and prune messages, the join message to establish a new multicast path from the source to a user terminal, and the prune message to discontinue the old multicast path from the source to the user terminal. The router sends the join message and the prune message over the new multicast path and the old multicast path. A second node located at the bifurcation of the new multicast path and the old multicast path detects the reception of both the join message and the prune message and steers, either directly or via delegated downstream nodes, the switch from the old multicast path over to the new multicast path without loss or undue duplication of packets sent from the source to the user terminal. | 09-29-2011 |
20110214160 | Method for Increasing Security in a Passive Optical Network - A method for security in a passive optical network is disclosed. The method includes, at an optical line termination (OLT): detecting an optical termination device and establishing a connection with the device; generating a first authentication message including a first random number; and transmitting the first authentication message through the established connection. At the optical termination device, the method may include: receiving the first authentication message; calculating a first authentication code by using the first random number and a secret code stored at the device; and generating and transmitting to the OLT a second authentication message including the first authentication code. The method may further include, at the OLT: receiving the second authentication message; calculating a second authentication code by using the first random number and a secret code stored at the OLT; and authenticating the optical termination device if the first authentication code matches the second authentication code. | 09-01-2011 |
20110211513 | Method for Setting the Operation of a Routing Node of an Asynchronous Wireless Communication Network, Network Node and Communication Network Implementing the Method - To reduce energy consumption in a duty-cycled asynchronous wireless communication network values of operation parameters, i.e. duration of the awake interval and duration of the sleep interval, of routing nodes of the network are determined and set. The network is partitioned into clusters so that each cluster comprises one cluster-head node. The energy consumption of a cluster is a function of the probability of busy channel when nodes of the cluster attempt transmission, the probability of communication collision during transmission, the duration of the awake interval and the duration of the sleep interval of its cluster-head node. Reduction of the energy consumption is carried out under predetermined values of the probability of busy channel and of the probability of communication collision and under predetermined constraint for the probability of successful transfer of data packets within the cluster and for the average delay of transfer of data packets within the cluster. | 09-01-2011 |
20110211045 | METHOD AND SYSTEM FOR PRODUCING MULTI-VIEW 3D VISUAL CONTENTS - A method for producing 3D multi-view visual contents including capturing a visual scene from at least one first point of view for generating a first bidimensional image of the scene and a corresponding first depth map indicative of a distance of different parts of the scene from the first point of view. The method further includes capturing the visual scene from at least one second point of view for generating a second bidimensional image; processing the first bidimensional image to derive at least one predicted second bidimensional image predicting the visual scene captured from the at least one second point of view; deriving at least one predicted second depth map predictive of a distance of different parts of the scene from the at least one second point of view by processing the first depth map, the at least one predicted second bidimensional image and the second bidimensional image. | 09-01-2011 |
20110208862 | METHOD AND SYSTEM FOR PROFILING DATA TRAFFIC IN TELECOMMUNICATIONS NETWORKS - A method of profiling communication traffic of users in a data network, comprising: monitoring communication traffic originated by a user of a communication terminal; and assigning to the user of the communication terminal a unique and anonymous user traffic identifier, wherein the user traffic identifier is related to a user address assigned to the communication terminal in the data network. Also, the user traffic identifier is adapted to be included in the communication traffic with respect to that user. The method further includes communicating the unique and anonymous user traffic identifier to the user terminal and having the user communication terminal include the user traffic identifier in the user traffic, upon receipt of communication traffic including the user traffic identifier, obtaining a descriptor of the received communication traffic useful to describe the detected traffic and at least temporarily storing the obtained descriptor; and building an anonymous user profile related to the user's communication activities based on the stored descriptors. | 08-25-2011 |
20110178801 | SYSTEM AND METHOD FOR ACCESS TO MULTIMEDIA STRUCTURES - A system for access to multimedia structures has telephone sets capable of connecting to a telephone network, a storage device capable of storing a plurality of multimedia structures representing messages and/or data and/or commands, and a network access server that can be associated with the telephone sets and is capable of selectively instantiating the multimedia structures via an interconnection network. There is also a voice-recognition and speech-synthesis system that can be associated with the network access server and that comprises modules for reading files in XML format and for processing the files so as to obtain files in a format that can be synthesized by a speech synthesizer. | 07-21-2011 |
20110158180 | METHOD OF PROCESSING RECEIVED SIGNALS, CORRESPONDING RECEIVER AND COMPUTER PROGRAM PRODUCT THEREFOR - Signals received from channels exposed to multi-path propagation via a plurality of diversity antennas and including at least one pilot signal are processed by detecting a set of multi-path components for each received signal and computing a set of channel coefficients from multi-path components of the at least one pilot signal in the set of multi-path components. The set of channel coefficients is organized as a channel coefficient vector. From the channel coefficient vector, a set of combining weights is estimated to be applied to the received signals by: computing a spatial correlation matrix of the channel coefficient vector by neglecting the correlations between multi-path components of the channel coefficient vector having different delays, whereby the correlation matrix is a block diagonal matrix including null coefficients other than for non-null sub-matrixes arranged along the diagonal of the correlation matrix, wherein the sub-matrixes have a size equal to the number of diversity antennas; deriving from the spatial correlation matrix a resulting matrix by calculating the inverse of the sub-matrixes or a scaled version thereof; and multiplying the resulting matrix and the channel coefficient vector in order to obtain the desired set of combining weights. | 06-30-2011 |
20110151788 | System and Method for Automatically Switching Connection of a Wireless Interface - A system is provided including a device and a control module. The device has a first wireless interface for connecting to a first further device and a second wireless interface for connecting to the control module. The first wireless interface is suitable for detecting that a second further device is located within its coverage area. The second wireless interface is suitable for communicating to the control module that the second further device is located within the coverage area. The control module is suitable for executing a service logic and for transmitting to the second wireless interface a command to disconnect the first wireless interface from the first further device. The first wireless interface is configured for executing the command, thus automatically disconnecting from the first further device, and for connecting the device to the second further device. | 06-23-2011 |
20110149780 | Method of Transmitting Data, Corresponding Systems and Computer Program Product Therefor - A method of transmitting signals from a base station towards user terminals in a cellular communication system. The method includes generating diversity signals, wherein at least one of the diversity signals is subjected to a selectively variable RF phase shift. Specifically, a set of radio link quality indicators is determined at the base station, wherein each radio link quality indicator is representative of the quality of the radio link between the base station and a respective one of the user terminals. The set of radio link quality indicators is used to generate an aggregated radio quality indicator, which in turn is used to selectively vary the variable RF phase shift. For example, the phase shift may be selected, which optimizes the aggregated radio quality indicator. | 06-23-2011 |
20110128869 | METHOD FOR TRANSMITTING INFORMATION PACKETS WITHIN AN ASYNCHRONOUS WIRELESS COMMUNICATION NETWORK AND NETWORK NODE IMPLEMENTING IT - A source node estimates not only the schedule time offset of the destination node but also the clock drift of the destination node. In this way, the source node may choose very accurately the transmission start time of an information packet to this destination node so that typically only one very short preamble needs to be transmitted. The estimation of time offset and clock drift between two nodes is achieved through tone or more previous transmissions between these two nodes, in particular, information relating to these parameters is transmitted from the destination node to the source node in reply to a preamble transmitted by the source node to the destination node. | 06-02-2011 |
20110119299 | METHOD AND COMMUNICATION SYSTEM FOR PROVIDING A CONTEXT-BASED COMMUNICATION SERVICE - A method for providing a context-based service in a communication network includes: at a context server cooperating with the network, receiving a query generated from a service application, indicating that the service application needs to receive from the context server a set of context information when a query condition is fulfilled; at the context server, generating an update rule indicating that a terminal has to transmit the context information to the context server when an update condition is fulfilled; transmitting the update rule from the context server to the terminal; detecting the context information and transmitting them to the terminal; at the terminal, receiving the context information and transmitting them to the context server when the update condition is fulfilled; and at the context server, forwarding the context information to the service application, thus allowing the service application to implement the context-based service. | 05-19-2011 |
20110085546 | METHOD AND DEVICES FOR MULTICAST DISTRIBUTION OPTIMIZATION - Multicast information flows are distributed from a source to user terminals over a network including aggregation routers arranged in hierarchical levels. Once a request for a given information flow is received from a user terminal, a distribution path can be defined through a plurality of aggregation routers. At one or more of the aggregation routers traversed by the information flow an information subflow can be derived to be propagated also towards lower-level aggregation routers that are not traversed by the information flow being distributed. Further requests for the same information flow received through an aggregation router towards which the information subflow was propagated are forwarded towards an aggregation router where the subflow was derived. | 04-14-2011 |
20110082937 | METHOD AND SYSTEM FOR THE COMMON MANAGEMENT OF COMMUNICATION RESOURCES IN A TELECOMMUNICATIONS NETWORK HAVING DISTINCT COMMUNICATION RESOURCES POOLS - A method of providing, in a telecommunications network including at least a first and a second set of communication resources, a service to users in a condition of being provided said service both by the first set of communication resources and by the second set of communication resources. The method includes the steps of: upon receipt, through the first set of communication resources, of a service request related to the service from a user, attempting to redirect the service request to the second set of communication resources; and if the attempt succeeds, provisioning the service to the user by the second set of communication resources. The attempt to redirect the service request includes identifying a communication resource among the second set of communication resources, by either considering or not communication resources of the second set as candidates for the service request redirection based on a history criterion that takes into account an observation of the outcome of past redirection attempts. | 04-07-2011 |
20110063361 | INK-JET PRINT HEAD HAVING IMPROVED ADHESION WITH TIME, ITS PROCESS OF MANUFACTURING AND ITS USE IN COMBINATION WITH A WATER-BASED INK CONTAINING ACIDIC SPECIES - The present invention relates to an ink-jet print head for an ink-jet printer comprising at least a substrate and a photopolymer barrier applied onto said substrate, said photopolymer barrier comprising an adhesive first layer and a second layer made of a photopolymerisable material and applied above said first layer, characterized in that said adhesive first layer is made of a cationically polymerisable material partially polymerised that, when contacted ny a water-based ink containing acidic species, is able to further polymerise, thus improving the photopolymer barrier adhesion on said surface of said substrate with time, the present invention also relates to a process of manufacturing said ink-jet print head and to its use in combination with a water-based ink containing acidic species. | 03-17-2011 |
20110058666 | METHOD AND SYSTEM FOR MANAGING COMMUNICATION SESSIONS SET-UP BETWEEN USERS - A method for enabling a calling user to establish a communication session with a called user, the calling user being associated with at least one calling user device and the called user being associated with at least one called user device, wherein the communication session can be established through a plurality of possible communication services and provisioning of said plurality of possible communication services is enabled through a corresponding plurality of communication service actuators, includes: a) receiving from the at least one calling user device, a request to establish a communication session with the called user, b) determining if, among said plurality of possible communication services, there is at least one communication service currently available to establish a communication session with the called user at the at least one called user device, based on current context information on the called user, c) in the affirmative case of b), selecting one of the at least one currently available communication service based on predetermined policies, and d) sending to the communication service actuator that enables the provision of the communication service selected in c) suitable information for starting establishment of the communication session between the calling user and the called user through the selected communication service. | 03-10-2011 |
20110054337 | METHOD AND MEDICAL DEVICE FOR REDUCING THE EFFECTS OF INTERFERENCE GENERATED BY A RADIO TRANSMISSION FROM THE MEDICAL DEVICE - A method of processing in a medical device an electric biological signal collected from a patient, includes: a) acquiring a plurality of samples from the electric biological signal according to a sampling process wherein each sample is taken from the electric biological signal and memorized; b) during the sampling process of a), monitoring an active/inactive status of a radio time-division-multiplexing transmission of signals from the medical device over a radio communication network; and, when the status of the radio time-division-multiplexing transmission becomes active, c) preventing in a) the acquisition of any of the plurality of samples, which according to the sampling process should be acquired during the active status of the radio time-division-multiplexing transmission, from being performed until the radio time-division-multiplexing transmission remains in the active status. | 03-03-2011 |
20110047612 | Method for Network Access, Related Network and Computer Program Product Therefor - A method of providing access of a mobile terminal to an IP network includes establishing a security association between the mobile terminal and a first security gateway of a first router in said plurality of routers. The mobile terminal is provided access to the IP network via the first router, and the data exchanged between the mobile terminal and the first router is encapsulated by using the security association. The security association is made available to at least one second router having a second security gateway. The mobile terminal is provided access to the IP network via said the second router, and data exchanged between the mobile terminal and the second router is encapsulated by using the same security association. Establishing the security association includes assigning a Security Parameter Index that identifies univocally the first security gateway and the security association. Making the security association available to the second router includes making available to the second router the Security Parameter Index. The second router may thus have access to the security association either by requesting it from the first router or by identifying it in a set of security associations sent from the first router to a set of routers candidate to become the second router as result of the mobility of the mobile terminal. | 02-24-2011 |
20110016145 | Enhancing ENUM Security - A method of providing telecommunication services includes generating a fictitious contact information univocally associated with a telephone number assigned to a subscriber; and storing the fictitious contact information in a database, like an ENUM database. Responsive to a request, received from a requester, of a contact information corresponding to the telephone number and adapted to allow contacting over the Internet the subscriber assignee of the telephone number, the method includes having the database providing the fictitious contact information; and conditioning a resolution of the fictitious contact information for the provisioning of the contact information to the satisfaction of at least one security rule adapted to assess properties of at least one among the requester and the request. In a case that the request from the requester satisfies the at least one security rule, the method resolves the fictitious contact information and provides the requester with the contact information. | 01-20-2011 |
20100309785 | ADMISSION CONTROL IN A TELECOMMUNICATION NETWORK - A method and system for performing admission control in a packet-based telecommunication network includes a backbone network coupled between at least two access networks. When a first user on a first access network wants to communicate with a second user located on a different access network, a request is made to a quality server whether network resources are available. The quality server separately monitors both access networks and the backbone network and determines whether network resources are available to satisfy the request. In one embodiment, a two-tier approach is used wherein a coordinator module interacts with an admission control subsystem including a plurality of subsystem modules. Each admission control subsystem module is responsible for monitoring a part of the network, such as, one access network or a backbone network. The coordinator module determines which subsystem modules are associated with the user request and interrogates such subsystem modules as to resource availability. | 12-09-2010 |
20100306414 | Transferring of SNMP Messages Over UDP with Compression of Periodically Repeating Sequences - The transfer of messages using an UDP transport is provided. A typical example is offered by the SNMP messages, used to perform the communication (C | 12-02-2010 |
20100287128 | Anomaly Detection for Link-State Routing Protocols - Disclosed herein is an anomaly detection method for link-state routing protocols, a link-state routing protocol providing for link-state update (LSU) messages to be exchanged between nodes in a packet-based network, wherein each link-state update message includes link-state advertisement (LSA) message(s) each having a respective header. The method comprises monitoring the link-state advertisement messages exchanged in the network, extracting and forming respective feature vectors with the values in the fields of the headers of the monitored link-state advertisement messages, and detecting an anomaly related to routing based on the feature vectors. In particular, detecting an anomaly related to routing includes feeding the feature vectors to a machine learning system, conveniently a one-class classifier, preferably a one-class support vector machine (OC-SVM). | 11-11-2010 |
20100285788 | Method and System for Optimizing the Configuration of a Wireless Mobile Communications Network - A method of upgrading a wireless mobile communications network deployed in the field, including capturing network events from the wireless mobile communications network; obtaining network simulation data from an automated network simulation planning tool; combining the captured network events and the network simulation data to derive diagnostic indicators adapted to evidence criticalities in a current network configuration; and modifying the current network configuration to overcome the criticalities. | 11-11-2010 |
20100285772 | Method and System for Determining Road Traffic Jams Based on Information Derived from a PLMN - A method of estimating traffic jams on a roads network includes receiving information from at least one cellular PLMN covering a geographic region wherein at least one road of the roads network to be monitored is located. The information includes data related to call traffic handled by the cellular PLMN in an at least one area of the geographic region, and an indication related to a mobility of mobile terminals into/out of the area The method may further include providing an indication of traffic jam in the at least one road in case the call traffic handled by the cellular PLMN in the at least one area exceeds a first threshold and the indication related to the mobility of mobile terminals into/out of the area trespasses a second threshold. | 11-11-2010 |
20100284388 | Management of a Hybrid Communication Network Comprising a Cellular Network and a Local Network - Disclosed herein is a method of managing a hybrid network including a cellular network and a local network wherein a number of dual mode mobile terminals are connectable to a base station of the cellular network through a direct cellular link and are also connectable, one with respect to the other, through the local network by a radio access technique. The method includes the steps of computing a cost associated with a direct connection established along a path (A) extending from a selected mobile terminal to the base station through the cellular link only, computing a cost (C | 11-11-2010 |
20100284283 | METHOD OF DETECTING ANOMALIES IN A COMMUNICATION SYSTEM USING NUMERICAL PACKET FEATURES - A method of detecting anomalies in a communication system, includes: providing a first packet flow portion and a second packet flow portion; extracting samples of a numerical feature associated with a traffic status of the first and second packet flow portions; computing from said extracted samples a first statistical dispersion quantity and a second statistical dispersion quantity of the numerical feature associated with the first and second packet flow portions, respectively; computing from the dispersion quantities a variation quantity representing a dispersion change from the first packet flow portion to the second packet flow portion; comparing the variation quantity with a comparison value; and detecting an anomaly in the system in response to said comparison. | 11-11-2010 |
20100284282 | METHOD OF DETECTING ANOMALIES IN A COMMUNICATION SYSTEM USING SYMBOLIC PACKET FEATURES - A method of detecting anomalies in a communication system includes: providing a first packet flow portion and a second packet flow portion; extracting samples of a symbolic packet feature associated with a traffic status of the first and second packet flow portions; computing from the extracted samples a first statistical concentration quantity and a second statistical concentration quantity of the symbolic feature associated with the first and second packet flow portions, respectively; computing from the concentration quantities a variation quantity representing a concentration change from the first packet flow portion to the second packet flow portion; comparing the variation quantity with a comparison value; and detecting an anomaly in the system in response to the comparison. | 11-11-2010 |
20100280897 | METHOD AND SYSTEM FOR PROVIDING A CONTENT-ON-DEMAND SERVICE - It is disclosed a method of providing a content-on-demand service to a user by a communication network. The method includes transmitting content to a first terminal of the user and determining whether the user wishes to pay for the content at a reduced price. In the affirmative, the method further includes: generating an acknowledge request message and an expected acknowledge message; generating an advertising block including k commercials and the acknowledge request message in such a way that the user is able to answer the acknowledge request message after consuming the k commercials; transmitting the advertising block to a second terminal of the user; listening for an acknowledge message from the second terminal; and determining whether the received acknowledge message corresponds to the expected acknowledge message. | 11-04-2010 |
20100278152 | Scheduling Method and System for Communication Networks; Corresponding Devices, Network and Computer Program Product - In a method of scheduling transmission services over a high speed packet access communication link such as a HSDPA and/or a HSUPA link a list of queues is created for transmission services to be provided over the link. The queues, which include both Real Time and Non Real Time queues, are allotted respective service priorities based e.g. on a channel quality indicator and/or a Quality of Service indicator to produce an ordered list of queues based on the service priorities. The link resources needed for serving at least one set of queues having higher priorities in the ordered list are estimated and a check is made. If these resources are available, the set of queues having higher priorities in the ordered list are served. If the resources required are not available, at least one queue is removed from the ordered list of queues. | 11-04-2010 |
20100275010 | Method of Authentication of Users in Data Processing Systems - A method of authentication of users in a data processing system is provided. The method includes a “Challenge” univocally associated with a user to be authenticated; processing the “Challenge” to generate an expected answer code, to be compared with an answer code that the user has to provide for authentication; encoding the generated “Challenge” for obtaining an image displayable through a display device; sending the image containing the “Challenge” to the user; displaying the image containing the “Challenge”; through a user device provided with an image-capturing device, optically capturing the displayed image; through the user device, processing the captured image for extracting from the captured image the “Challenge”, and subsequently processing the obtained “Challenge” for generating the answer code; receiving the answer code from the user and comparing it to the expected answer code; and, in case of positive comparison, authenticating the user. One among the actions of generating a “Challenge” and an expected answer code, and the action of processing the captured image that generates the answer code exploit secret information univocally associated with the user. | 10-28-2010 |
20100273508 | Method and System for Forecasting Travel Times on Roads - A method of providing forecast of road transit times on roads of a monitored roads network, can include receiving a forecasted road transit time indication calculated by a road traffic monitoring system in respect of at least one road of the monitored roads network; and correcting the received forecasted road transit time indication based on information obtained from a cellular mobile communications network. The information includes information related to mobile terminals connected to the cellular mobile communications network and engaged in calls, and located in the neighborhood of the at least one road. | 10-28-2010 |
20100273491 | Method and System for Estimating Road Traffic - A method of estimating road traffic on a roads network, comprising: receiving information from at least one information source, wherein the information received from the at least one information source is one among a first information type and a second information type; defining at least two different information processing methods, each one associated with a respective one of said information type; selecting the information processing method based on the available information type and on predefined criteria; and processing with the selected information processing method the corresponding available information type; and providing an estimation of the road traffic based on the result of said processing. | 10-28-2010 |
20100273424 | Method for Enjoying a Service Through a Mobile Telephone Terminal and Subscriber Identification Card for Implementing It - A method is provided which allows a service to be enjoyed through a mobile telephone terminal without the need of paying for this service. The can be achieved by allowing a first subscriber to use the credit or subscription of a second subscriber. The subscriber identification cards at least of the two subscribers involved are provided with short range radio communication transceivers and establish a short range communication channel between them so that one card may request the other card to pay for this service and the other card may grant this request through this channel. Then the mobile telephone networks of the cards are informed of the granted request. Before, during and after the grant of the request, the subscriber identification cards remain active and operative in communicating together and with the associated terminals. | 10-28-2010 |
20100271935 | PROTECTING AN ETHERNET NETWORK HAVING A RING ARCHITECTURE - Delivering multicast data traffic over a communication network includes a first network node delivering multicast data traffic to second network nodes. The first and second network nodes are connected by a transmission network in a ring architecture and implement a point-to-multipoint layer 2 protocol. A method includes at the first network node: collecting alarms signals indicative of a failure along the whole ring and of the second network nodes. Based on a current state of the alarm signals, delivering the multicast data traffic either in a first delivery direction along the ring, or in a second delivery direction along the ring opposite to the first delivery direction, or in both the first and second delivery directions. At each of the second network nodes: collecting alarm signals indicative of a failure of the transmission network locally to the second network node and of the second network node. Based on a current state of the local alarm signals either receiving the multicast data traffic delivered by the first network node from the first direction, forwarding the multicast data traffic in the first direction and transmitting local data traffic to the first network node along the second delivery direction, or receiving the data traffic delivered by the first network node from the second direction, forwarding the multicast data traffic in the second direction and transmitting the local data traffic to the first network node along the first delivery direction. | 10-28-2010 |
20100267347 | METHOD AND SYSTEM FOR MULTIPLE ANTENNA COMMUNICATIONS, RELATED APPARATUS AND CORRESPONDING COMPUTER PROGRAM PRODUCT - A system for diversity processing two signals transmitted and/or received via two diversity antennas includes at least four respective propagation paths coupling the signals to the two diversity antennas. Diversity processing is primarily in the form of decorrelation achieved by means of time variable delay elements that apply time variable delays to the signals propagating over at least two of the propagation paths in the system. The related processing may take place either at RF or IF, or at baseband, whereby the time variable delays are applied by subjecting the baseband signals to multiplication by a complex signal. | 10-21-2010 |
20100245426 | Ink-jet printing method and ink-jet printing system for multi-definition printing - The present invention relates to a method of addressing the nozzles of a printhead; a group of nozzles of a print column of the printhead are staggered and are arranged according to a spatial order, e.g. N | 09-30-2010 |
20100227573 | METHOD AND SYSTEM FOR RADIATING A RADIOELECTRIC SIGNAL THROUGH A COMBINATION OF SECTOR ANTENNAS - A method of radiating a radioelectric signal in an area of interest composed of at least two different area sectors, the method including providing at least two sector antennas arranged to cover the at least two different area sectors; feeding the at least two sector antennas with respective feed signals obtained from said signal; spacing apart the at least two sector antennas from each other of a distance equal to or greater than one wavelength of a radioelectric signal to be irradiated; and acting on the feed signals fed to the at least two sector antennas in such a way that a relative phase of signals transmitted by the at least two sector antennas is caused to vary in time. | 09-09-2010 |
20100216439 | Method and System for Displaying User-Related Information on Users' Handsets - A method of displaying user-related information to a user on a display of a user's mobile telephony handset, including modifying a content of a file resident in a subscriber identification module operatively associated with the user's mobile telephony handset and used to store a name of a mobile telephony operator, said modifying comprising writing in said file the user-related information to be displayed. | 08-26-2010 |
20100203834 | METHOD AND SYSTEM FOR DETECTING A MOVING VEHICLE WITHIN A PREDETERMINED AREA - The system allows a reliable and automatic detection of moving vehicles and advantageously also identification of the moving vehicles. A WPAN node device (advantageously a ZigBee node device) is installed on a vehicle to be detected when the vehicle is moving. Three WPAN node devices (advantageously three ZigBee node devices) are installed on the ground. One of the three WPAN node devices has a wide radio coverage area and acts as an “exciter” of the vehicle WPAN node device. Another one of the three WPAN node devices has a wide radio coverage area and acts as the “parent” of the vehicle WPAN node device. A further one of the three WPAN node devices has a narrow radio coverage area and acts as a “detector” of the vehicle WPAN node device. The three radio coverage areas are sized and located so that a moving vehicle to be detected enters the area of the “exciter” before entering the area of the “parent” and before entering the area of the “detector”. After detection, the system provides for sending information to a fourth WPAN node device present in a user mobile telephone terminal. | 08-12-2010 |
20100190491 | ASSOCIATION OF A MOBILE USER IDENTIFIER AND A RADIO IDENTIFIER OF A MOBILE PHONE - A method of associating a mobile user identifier identifying a mobile interface of a mobile phone and a radio identifier identifying a radio interface of the mobile phone includes: at a device configured to communicate with the radio interface, detecting that the mobile phone is located within a coverage area of the device, thus recovering the radio identifier; establishing a radio connection between device and mobile phone; transmitting to the mobile phone through the radio connection a command to access a mobile service for transmitting to an association server a message including the radio identifier; at the mobile phone, transmitting the message to the association server through the mobile service; and at the association server, retrieving the mobile user identifier through the mobile service and reading the radio identifier from the message, thereby associating the mobile user identifier and the radio identifier. | 07-29-2010 |
20100182375 | INK JET PRINTING HEAD - The present invention relates to an ink-jet print head comprising a substrate, a structural or barrier layer defining ink passage ways, and, optionally, a nozzle plate, wherein a layer of polymeric material comprising carbon, hydrogen, and nitrogen atoms improves the adhesion of the layer defining ink passage ways with the substrate and/or the nozzle plate. The present invention also relates to a process of manufacturing an ink-jet print head including the step of forming the layer of polymeric material comprising carbon, hydrogen, and nitrogen atoms with a plasma treatment. | 07-22-2010 |
20100158200 | METHOD FOR THE STATUS ANALYSIS OF A SUBSCRIBER LOOP TO SUPPORT BROADBAND TELECOMMUNICATION SERVICES - A method for analysing the status of a subscriber loop belonging to an access network portion of a fixed network infrastructure, the subscriber loop not supporting a broadband service wherein the access network portion includes further subscriber loops, a set of which support broadband services. The method includes the steps of collecting attenuation measures associated with said set of subscriber loops supporting said broadband services; and processing said attenuation measures to obtain an estimation of a maximum bit rate that can be offered on the subscriber loop to be analysed. | 06-24-2010 |
20100128806 | METHOD FOR PLANNING A DIGITAL VIDEO BROADCASTING NETWORK - A method and a system for planning a digital video broadcasting network in a geographic area of interest includes simulating an electromagnetic field propagation in a plurality of area elements of the area of interest; for at least one area element of the plurality, performing a decoding of the simulated radio signals which, as a result of the simulating, are received at that area element, and based on a result of the decoding, determining a service coverage in the area of interest, wherein the network is a digital video broadcasting-handheld network and performing a decoding of the radio signals includes changing a position in time of a decoding time window, in particular, for determining the position wherein the ration signal/noise is maximum. | 05-27-2010 |
20100128731 | METHOD AND SYSTEM FOR DATA MANAGEMENT IN COMMUNICATION NETWORKS - A method for operating a node of a communication network including a plurality of peer-to-peer nodes, the node being linked with predetermined neighbour nodes among the plurality of peer-to-peer nodes, includes: a) storing, on a first storage area, node information indicative of predetermined data required by the node to become an information provider node; b) waiting to receive from at least one information provider node of the neighbour nodes describing information of data that can be provided by the information provider node; c) at the receipt of the describing information from the at least one information provider node, checking in the first storage area if the data that can be provided by the at least one information provider node match at least in part the predetermined data required by the node; d) in the affirmative, deleting in the first storage area the node information indicative of the matching data; and e) in the negative, forwarding the describing information received in c) to at least one of the plurality of peer-to-peer nodes. | 05-27-2010 |
20100128696 | MANAGEMENT OF SEAMLESS HANDOVER BETWEEN DIFFERENT COMMUNICATION SYSTEMS IN AN IP DUAL-MODE TERMINAL - A dual-mode terminal designed to connect to an IP-based network via a first communication system and a second communication system, the dual-mode terminal including a first physical network interface module adapted to establish a packet-based communication with the IP-based network via the first communication system, the first physical network interface module being accessible via a first physical network interface having a first physical network address; a second physical network interface module adapted to establish a packet-based communication with the IP-based network via the second communication system, the second physical network interface module being accessible via a second physical network interface having a second physical network address; an IP-based protocol stack adapted to operate between a software application in the dual-mode terminal and the first and second physical network interface modules; and a system for performing a seamless handover between the first communication system and the second communication system during a connection to the IP-based network. | 05-27-2010 |
20100054142 | COMMUNICATIONS METHOD FOR A PACKET-SWITCHED AND NETWORK AND NETWORK EMPLOYING THE METHOD - A communications method for a packet-switched network includes: a) receiving at a routing module operating in a low layer of a layered model defining communications on the network, a packet including an identifier associated to a protocol to be employed at a high layer of the model which is higher than the low layer; b) inspecting the received packet at an inspection module so as to identify the protocol associated to the identifier; c) selecting at a selection module a first device, operating in the high layer associated with the identified protocol; d) sending the packet toward the first device; e) processing the packet by applying at the first device a procedure of the high layer to produce a processed packet; f) sending the processed packet from the first device to the routing module; and g) transmitting the processed packet from the routing module toward the network. | 03-04-2010 |
20100049987 | METHOD AND ARRANGEMENT FOR SECURE USER AUTHENTICATION BASED ON A BIOMETRIC DATA DETECTION DEVICE - An arrangement for secure user authentication includes a computer or telecommunication terminal with a smartcard and a device. The smartcard is adapted to securely store biometric information relating to at least one user and the device is adapted to detect biometric data of users. The smartcard and the device include a radio interface for communicating together and a module for exchanging biometric information between each other. In this way, tampering of the transferred biometric information is difficult. In order to increase the security, one or more of the following measures may be used: a secure communication channel between the device and the smartcard, a direct (preferably short range) communication channel between the device and the smartcard and encryption and decryption of biometric information transferred between the device and the smartcard. | 02-25-2010 |
20100047003 | PRINTER AND EXTRACTABLE MODULE THEREFOR - A printer and a module for supporting a paper roll therefore, the module comprising: a body for housing the roll; a first supporting member for the roll before that the roll is unwound for the printing operation; a second supporting member for the roll, after the roll has been wound at the end of printing operations; and a first engaging member carried by said body and disposable in a first configuration wherein it is coupled with a second engaging member carried by the printer to secure the module on the printer; the first engaging member is further disposable in a second configuration, wherein it is released from the second engaging member to permit the extraction of the module from the printer. | 02-25-2010 |
20100035619 | METHOD FOR PLANNING A CELLULAR MOBILE TELECOMMUNICATIONS NETWORK - A method for planning a cellular mobile telecommunications network includes at least one network cell and is intended to provide network services to users located in the network cell, wherein the method includes: a) setting a current provisioning rate to the highest of the provisioning rates; b) estimating a power required to the at least one network cell for providing the at least one network service in the service area at the current provisioning rate; c) comparing the estimated required power to a maximum power deliverable by the at least one cell; and, if the estimated required power exceeds the maximum deliverable power; d) reducing the service area so that the estimated power required to the at least one network cell for providing the at least one network service at the current provisioning rate in the reduced service area does not exceed the maximum deliverable power; e) updating the current provisioning rate to the immediately lower provisioning rate of said plurality, if any; and f) repeating steps b) and c) and, if required, steps d) and e). | 02-11-2010 |
20100035593 | METHOD FOR MANAGING A CONFERENCE CALL IN A TELEPHONE NETWORK - A method of managing, in a telephone network, a conference call among a first terminal and a plurality of terminals, includes: setting up at least one voice channel for activating the conference call among the first terminal and the plurality of terminals; and causing deactivation of a microphone of at least one terminal of the plurality of terminals. | 02-11-2010 |
20100020744 | METHOD FOR MANAGING VOICE CALLS DURING PACKET-SWITCHED SESSIONS, AND MOBILE COMMUNICATIONS NETWORK IMPLEMENTING THE METHOD - A method of managing circuit-switched calls in a mobile communications network supporting packet-switched sessions is performed as follows: upon reception by the mobile communications network of a circuit-switched call for a user of the mobile communication network, the network ascertains whether the user is engaged in a packet-switched session. In the affirmative case, the network closes the packet-switched data exchange session prior to attempting to route the call to the user. | 01-28-2010 |
20100015958 | METHOD AND APPARATUSES FOR THE PROVISION OF NETWORK SERVICES OFFERED THROUGH A SET OF SERVERS IN AN IMS NETWORK - A method for managing the provision of services in a telecommunication network, wherein the services are offered through a set of servers and the telecommunication network includes at least one first network entity and a plurality of second network entities, each second network entity being adapted to access a sub-set of the servers. The method includes: 1) receiving at the first network entity a request for a predetermined service from user equipment; and 2) at the predetermined first network entity, identifying, based on the service requested by the user equipment, the second network entity which, among the plurality of second network entities, has access to the server that, among the set of servers, allows meeting the request for the predetermined service. | 01-21-2010 |
20090315932 | METHOD AND SYSTEM FOR HIGH SPEED MULTI-PASS INKJET PRINTING - A method of printing from a printhead includes virtually dividing a nozzle array of the printhead into first and second nozzle sections. N print masks associated with the first and second nozzle sections govern the deposition of ink drops on a print medium. The N print masks are associated with one swath and are defined as a mask grid. The mask grid is arranged as a series of vertically extending adjacent mask columns and a series of horizontally extending mask rows. The vertically extending mask columns comprise enabling mask columns comprising first mask elements and disabling mask columns consisting essentially of second mask elements. The N print masks are associated with the first and second nozzle sections for printing an input image. Each print mask is defined as a mask grid arranged in an N series of vertically extending adjacent mask columns and a series of Z horizontally extending mask rows. The series of mask rows are divided in first and second adjacent mask sections corresponding to the first and second nozzle sections, respectively. The mask rows of the second mask section are arranged spaced from one another by N−1 adjacent second mask elements and the mask rows of the first nozzle section are arranged spaced from one another by 2N−1 adjacent second mask elements within the same mask row | 12-24-2009 |
20090304090 | Method for Scalable Video Coding - A method for estimating motion for the scalable video coding, includes the step of estimating the motion field of a sequence of photograms which can be represented with a plurality of space resolution levels including computing the motion field for the minimum resolution level and, until the maximum resolution level is reached, repeating the steps of: rising by one resolution level; extracting the photograms for such resolution level; and computing the motion field for such resolution level. The motion field is computed through an optical flow equation which contains, for every higher level than the minimum resolution level, a regularization factor between levels which points out the difference between the solution for the considered level and the solution for the immediately lower resolution level. A more or less high value of the regularization factor implies more or less relevant changes of the component at the considered resolution during the following process iterations. | 12-10-2009 |
20090303940 | Method and System for Controlling the Allocation of Services In a Communication Network, and Corresponding Network and Computer-Program Product - The provision of services to the users of a multi-resource communication network is controlled by modelling the system made up of these resources as a Markov chain, wherein each state of the Markov chain is identified by a respective set of values of the numbers of the users served by each of the resources, and the transitions between states are represented by the allocation and de-allocation to the users of the services provided by the resources. A cost function is defined wherein each of the states gives a respective contribution weighted by the probability that the Markov chain is in that state, such probability being a function of the possible transitions between the states. A plurality of transitions between the states is thus identified that optimizes the cost function, and the resources are allocated to the users according to such plurality of transitions that optimizes the cost function. | 12-10-2009 |
20090303296 | INKJET PRINTHEAD - An inkjet printhead comprising a substrate having an ink feed slot formed in the substrate and having a first longitudinal edge and a second longitudinal edge opposite to said first longitudinal edge, the first longitudinal edge extending along a first longitudinal axis (X); a first row of vaporization chambers arranged along said first longitudinal edge and a second row of vaporization chambers arranged along the second longitudinal edge, in which each chamber ( | 12-10-2009 |
20090295869 | Nozzle Plate for an Ink Jet Print Head Comprising Stress Relieving Elements - The invention relates to an ink jet print head structure for printing devices, comprising a substrate in which one or more slots are realized and a nozzle plate connected to the substrate. The nozzle plate defines a first axis (X) and a second perpendicular axis (Y) and comprises a plurality of nozzles from which ink is ejected in fluid communication with the slots. The slots extends along the second axis (Y). A plurality of strip-like stress relief elements is realized on the nozzle plate, the plurality of stress relief elements is disposed so to extend along the Y axis, and each stress relief element of the plurality defines an aperture on a free surface of said nozzle plate. In addition, the total X projections of all apertures defined by the plurality of stress relief elements along the first (X) axis has a resulting length comprised between 10% and 55% of the overall width of the nozzle plate along the same first axis (X). | 12-03-2009 |
20090284558 | INKJET PRINTHEAD AND A METHOD OF INKJET PRINTING - An inkjet printhead comprising a plurality of firing cells, each adapted to generate ink droplet, said firing cells being arranged to form a plurality of matrices; a control circuit for selectively activating said firing cells; said control circuit comprising: a first memory register for storing main printing data defining which firing cells have to be activated in a first printing operation; a second memory register for storing auxiliary printing data defining which firing cells have to be activated in a second printing operation; a processing unit operatively associated with said first and second memory registers for transferring said auxiliary printing data into said first memory register, thereby defining which firing cells have to be activated in said second printing operation; a firing unit for sending to said matrices a single firing signal for each printing operation. Also disclosed is a method of inkjet printing. | 11-19-2009 |
20090275314 | Method and System for Providing Presence Information - A method for providing presence information associated with a first user of a telecommunications network, includes collecting from at least one network apparatus user-related data adapted to build the presence information; and publishing the collected user-related data. The publishing includes arranging the collected user-related data in the presence information and making it available to at least a second user. The collecting of the user-related data from the network apparatus is conditioned to the receipt from the second user of a request for providing the presence information for the first user. | 11-05-2009 |
20090268809 | Method, apparatus and system for robust video transmission - A method of transmitting video data related to a sequence of video frames, includes: encoding the video frames according to a first predictive encoding to generate encoded video data, the encoded video data including a prediction error based on the difference between a portion of a current video frame in the sequence and a first predictor thereof based on a first preceding video frame in the sequence; generating auxiliary video data related to the portion of the current video frame; and transmitting the encoded video data and the auxiliary video data to a receiver, the encoded video data being transmitted over a first channel, and the auxiliary video data being transmitted over a second channel. The step of generating auxiliary video data includes calculating a correlation between the first predictor and a predetermined second predictor based on a second preceding video frame in the sequence, the second preceding video frame preceding in the sequence the first preceding video frame. | 10-29-2009 |
20090252923 | INK JET CARTRIDGE COMPRISING A LAYER MADE BY A CURABLE RESIN COMPOSITION - The present invention relates to a curable resin composition comprising a cyclic aliphatic multifunctional epoxy resin having general formula of the specification, a cyclic aliphatic difunctional epoxy resin having general formula of the specification, and, optionally, a photoinitiator, a process for manufacturing an ink jet printhead comprising a polymeric material layer defining ink passage ways formed by curing said curable resin composition, and ink-jet print head comprising a polymeric material layer defining ink passage ways formed by curing said curable resin composition. | 10-08-2009 |
20090252139 | Radio-Access Method for Mobile-Radio Networks, Related Networks and Computer Program Product - A mobile-radio network includes radio base stations providing radio coverage to the users of the network via antenna elements, wherein the antenna elements are equipped with at least one first communication channel and at least one second communication channel. The first communication channel provides a first layer of individual microcell radio coverage for the antenna elements. The second communication channel is made common to groups of the antenna elements and provides a second layer of virtual macrocell radio coverage, wherein the coverage of each virtual macrocell aggregates the microcell radio coverages of the antenna elements included in the respective group. | 10-08-2009 |
20090244220 | INK JET CARTRIDGE HAVING AN INK CONTAINER COMPRISING TWO POROUS MATERIALS - An ink jet cartridge comprising an ink container which comprises a bottom portion and an upper portion, said bottom portion being in communication with the printhead through an ink supply port, and said upper portion being in communication with a vent hole, wherein said bottom portion comprises a first ink absorbing member, and said upper portion comprises a second ink absorbing member, wherein said first ink absorbing member is a compressible porous material and said second ink absorbing member is an incompressible porous material, and wherein the capillarity of said first ink absorbing member is higher than the capillarity of said second ink absorbing member. | 10-01-2009 |
20090234784 | Method of Providing Selected Content Items to a User - A method for providing selected content items to a user. The selection of content items is based on metadata pre-assigned to content items, typically authored content metadata, and on metadata generated and associated afterwards, called derived content metadata. Additionally, the selection of content items can be based also on context metadata, particularly derived context metadata. Derived metadata are automatically generated on the basis of derivation rules corresponding to algorithms to be applied to, e.g., the content of content items, authored content metadata and context metadata. User profiles can be used for improving the selection quality. A method is also disclosed for building and maintaining user profiles based on machine learning techniques. | 09-17-2009 |
20090221278 | Method for Customizing the Operation of a Telephonic Terminal - A method serves for customizing the operation of a telephonic terminal, in particular a mobile telephonic terminal of a user. A profile file is provided for storing information relating to operation parameters of the telephonic terminal. The information stored in the profile file can be modifiable by the user. Additionally, a policy file is provided for storing information relating to the possibility to modify one or more of the operation parameters by the user. Typically, a profile manager software module manages the profile file and a policy manager software module manages the policy file. When a user attempts to carry out modifications on information stored in the profile file, the profile managing module interacts with the policy managing module in order to check the possibility to carry out the modifications and to get the authorisation or the denial from the policy managing module. | 09-03-2009 |
20090219379 | Average Calculation in Color Space, Particularly for Segmentation of Video Sequences - A method of image processing includes: providing a plurality of image frames and processing at least one image frame. A description of a plurality of pixels of the plurality of image frames is provided in a color space, including at least an angular coordinate. A method is disclosed for reliably calculating the average of the angular coordinate. | 09-03-2009 |
20090217369 | Method and system for processing packet flows, and computer program product therefor - Packet flows are processed, e.g. to perform an intrusion detection function in a communication network, by means of a multiprocessor system including a plurality of processing units. The packets are distributed for processing among the processing units via a distribution function. Such a distribution function is selectively allotted to one of the processing units of the plurality. A preferred embodiment of the arrangement involves using a single Symmetric Multi-Processor machine with a single network port to Gigabit/sec link. The corresponding system architecture does not require any intermediate device, or any external load balancing mechanism. All the processing work is performed on a single system, which is able to dynamically balance the traffic load among the several independent CPUs. By resorting to a specific scheduling arrangement, such a system is able to effectively distribute the computations required to perform both the loadbalancing and the detection operations. | 08-27-2009 |
20090217357 | Method and System for Managing Authentication of a Mobile Terminal in a Communications Network, Corresponding Network and Computer-Program Product - A terminal is authenticated in view of inclusion in a communication network by an authentication process conditioned upon location information transmitted from the terminal to at least one server in the network. At least one access point for the terminal to the network is configured for allowing a non-authenticated terminal to transmit to an authentication server in the network authentication messages based on a given authentication protocol, such as, e.g., EAP. The terminal is configured for transmitting the location information to the authentication server by conveying it over the authentication protocol. A location system can be integrated in the terminal to generate location information identifying the location of the terminal, and in that case the terminal is configured for transmitting the location information identifying the location of the terminal to authentication server. As an alternative, a location server is associated with the network and the location information is transmitted from the terminal to the location server. On the basis of the location information transmitted from the terminal, the location server generates location information identifying the location of the terminal and sends the information to the authentication server. | 08-27-2009 |
20090214025 | Method for Scalar Multiplication in Elliptic Curve Groups Over Prime Fields for Side-Channel Attack Resistant Cryptosystems - A method and device for transforming data with a secret parameter in an elliptic curve cryptosystem based on an elliptic curve defined over an underlying prime field, includes multiplying a point of the elliptic curve; representing the data to be transformed, by a scalar representing the secret parameter, wherein the multiplying includes performing at least one point addition operation and at least one point doubling operation on points of the elliptic curve; providing a representation in affine coordinates of the elliptic curve point to be multiplied and a representation in projective coordinates of intermediate elliptic curve points obtained during the multiplying; performing both the point addition operation and the point doubling operation by means of a sequence of elementary prime field operation types, the elementary prime field operation types including: a first type of prime field operations including field multiplication and field squaring of coordinates of the elliptic curve points and a second type of prime field operations including field addition, field doubling, and field subtraction of coordinates of the elliptic curve points. | 08-27-2009 |
20090213195 | Ink jet print cartridge with independent adjacent sealing plugs - A Multi-color ink-jet print cartridge includes an integrally shaped one-piece body with a reservoir portion including at least two ink chambers, and a manifold portion including at least two ink conduits, each ink conduit hydraulically connected to a corresponding one of the ink chambers through a port. An ink-jet printhead, includes at least two nozzle arrays, each of which arrays is hydraulically connected to a corresponding one of the ink conduits. A lid covers the reservoir portion of the body. Each of the ink conduits includes a channel portion in side to side relationship with the corresponding channel portion of the adjacent ink conduit. The channel portions have adjacent openings on one external wall of the body. Separate independent plugs are sealingly inserted into the adjacent openings. | 08-27-2009 |
20090201823 | Method for Dimensioning A Data Packets Handler Apparatus In A Packet-Switched Mobile Communications Network - A method of dimensioning a data packets handler apparatus in a mobile communications network includes a plurality of cells, each one providing mobile communications coverage in a respective geographic area, the mobile communications network supporting packet-switched traffic and circuit-switched traffic, wherein the data packets handler apparatus to be dimensioned is associated with at least one cell of the mobile communications network. The method includes: obtaining an indication of radio communications resources of the at least one cell; obtaining an indication of an offered packet-switched traffic with respect to the at least one cell; and determining an amount of resources of the data packets handler apparatus potentially needed by the at least one cell for handling the packet-switched traffic based on the radio communications resources and on the offered packet-switched traffic. | 08-13-2009 |
20090195604 | INK-JET PRINTHEAD AND MANUFACTURING METHOD THEREOF - The present invention provides a process for manufacturing an ink-jet printhead comprising the steps of providing a print head wafer comprising a plurality of print head dice, each print head die comprising a nozzle plate bonded to a barrier layer formed on a substrate, wherein said plurality of print head dice are arranged on the substrate so as to define at least one first dividing channel comprising at least one first channel portion, said at least one first channel portion having a bottom portion comprised between the lateral sides of said barrier layer of at least two adjacent print head dice and an upper portion comprised between the lateral sides of said nozzle plate of said at least two adjacent print head dice, and applying an adhesive composition in an amount able to substantially fill the whole length of said at least one first channel portion. | 08-06-2009 |
20090190583 | Method for Determining Prospective Peering Partners for an Internet Service Provider - A method for determining prospective peering partners for an internet service provider, includes gathering internet service provider's routing and traffic information; gathering additional routing information from sources other than the internet service provider; identifying uncovered target autonomous systems based on the internet service provider's routing and traffic information, the uncovered target autonomous systems being autonomous systems with non-null traffic and that are reachable by the internet service provider via a transit relationship; identifying paths from the internet service provider to the uncovered target autonomous systems based on the additional routing information; identifying intermediate autonomous systems along the identified paths; and determining at least a prospective peering partner for the internet service provider based on the identified intermediate autonomous systems. | 07-30-2009 |
20090176500 | Method for Planning a Cellular Mobile Telecommunications Network - A method for planning a cellular mobile telecommunications network includes at least one network cell and is intended to provide network services to users located in the network cell. The method includes: a) initializing, for the at least one network cell, a service area and a transmission power for each user equipment; b) estimating a total power received by the at least one network cell from user equipment located in the service area and using the at least one network service; c) based on the estimated total received power, varying the transmission powers required to user equipment located in the service area in order to reach a target quality of service constraint for the at least one network service; d) iterating the steps b) and c) until a stability condition is reached wherein the transmission power variation for at least a predetermined fraction of the user equipment is lower than a predetermined threshold; e) calculating a total received power corresponding to the transmission powers at the end of step d); f) calculating an uplink load factor corresponding to the total received power calculated in step e); g) ascertaining whether the calculated uplink load factor is lower than a maximum uplink load factor, and, in the negative case: h) restricting said service area; and i) repeating the steps from b) to g). | 07-09-2009 |
20090158032 | Method and System for Automated and Secure Provisioning of Service Access Credentials for On-Line Services to Users of Mobile Communication Terminals - In a communications network including at least one authentication entity adapted to authenticating a network access requestor in order to conditionally grant thereto access to the communications network, wherein the authenticating is based on public key cryptography, a method for automatically provisioning the network access requestor with service access credentials for accessing an on-line service offered by an on-line service provider accessible through the communications network. The method includes: during the authenticating the network access requestor, having an authentication entity request to the on-line service provider the generation of the service access credentials; at the on-line service provider, generating the service access credentials, encrypting the service access credentials by exploiting a public encryption key of the network access requestor and providing the encrypted service access credentials to the authentication entity; and having the authentication entity cause the network access requestor to be provided with the encrypted service access credentials. | 06-18-2009 |
20090154807 | Edge Comparison in Segmentation of Video Sequences - A method of image processing, includes: receiving at least one video frame of a video sequence, the at least one video frame including at least one foreground subject and a background; and processing the at least one video frame so as to separate the at least one foreground subject from the background. The processing includes: obtaining a reference image including the background; comparing the at least one video frame to the reference image; and generating a pixel mask as a result of the comparison, the pixel mask indicating whether a pixel of the at least one video frame belongs to the foreground subject or to the background. The method further comprises at least partially determining edges of the at least one foreground subject in the at least one video frame, and modifying the pixel mask based on the determined foreground subject edges. | 06-18-2009 |
20090113033 | Method and System for Managing Operations on Resources of a Distributed Network, in Particular of a Communication Network, and Corresponding Computer-Program Product - A system for generating instruction signals arranged in workflows or rules for performing interventions on equipment, such as equipment of a communication network, wherein the equipment may be associated with resource proxy agents, each responsible for managing a single equipment. The system includes a distributed architecture of intervention management proxy agents provided with respective workflow-based or rule-based engines to generate the instruction signals, each agent being associated with a terminal device. The intervention management proxy agents may be interactively coupled with the resource proxy agents or with a manager resource associated with the equipment, whereby the instruction signals are a function of the status of the equipment on which the interventions are performed. | 04-30-2009 |
20090109860 | Method and System for Identifying Faults In Communication Networks - In order to locate malfunction in a communication network, the elements therein are configured for generating alarm and to propagate a malfunction signalling to at least one other element in said set. Those elements in the network to which the malfunction signalling was propagated, are excluded, preferably by way of self-exclusion, from the action of locating malfunction. Preferably the arrangement is implemented in the form of a distributed agent-based architecture, wherein each element has an associated agent for categorizing the alarm information in its possession, e.g., as related to internal malfunction, contiguous malfunction, and external malfunction. The categorized alarm information is collected, preferably via direct exchange between the associated agents, for all the elements having alarmed resources physically or logically connected with each other. On the basis of the categorized alarm information collected, at least one element responsible for malfunction is elected out of those elements in possession of alarm information categorized as related to internal malfunction or contiguous malfunction, while discarding those elements in possession only of alarm information categorized as related to external malfunction. | 04-30-2009 |
20090098892 | Method for Exploiting Signalling Messages in a Wireless Communication Network - A method of exploiting a signaling message related to a predetermined OSI layer of a wireless communication system and adapted to transmit signaling information specific of the OSI layer for transmitting data different from the signaling information, includes: ascertaining the presence of unallotted space in the signaling message; based on the ascertained presence of unallotted space, determining an amount of transmissible data different from the signaling information; and modifying the signaling message by filling at least part of the unallotted space with the amount of transmissible data. The method is in particular useful in cellular telephony networks like 2G and 3G networks, in 802.1 | 04-16-2009 |
20090091592 | Method of Inkjet Printing for Use in Point-Of-Sale Systems - This invention relates to a method of inkjet printing, in particular for use in POS systems. In particular the printing method according to the invention is of the thermal type. In order to obtain high speed printing, for example of 15-20 lines per second when printing text on a paper medium 60-80 mm wide (for example receipts), the drops of ink ejected during the printing operation advantageously have a relatively large volume, i.e. not less than approximately 100 picolitres (pl) and preferably between 100 and 200 pl. The ink used for applications in POS systems must quickly penetrate an extensive range of paper media. This requirement is satisfied by using an ink having a surface tension of not more than approximately 35 dyne/cm (mN/m). Problems of stagnation and dripping of the ink caused by the printing conditions are overcome through the use of a nozzle plate coated with a wetting-resistant layer of silicon carbide. This coating material has proved to have non-wettability properties which do not significantly deteriorate during a printing operation over a long period of time. | 04-09-2009 |
20090054104 | Method for the management of a peripheral unit by a sim card in wireless communication terminals, and peripheral unit for implementing the method - A wireless communication terminal includes a SIM card and a memory card equipped with respective radio transceivers for allowing a terminal-independent and network-independent radio communication between both cards. Server and client applications on the controllers of the transceivers allow the SIM to manage the memory card. The memory card tries to become connected to the SIM. If connection is successful, the SIM authenticates the memory card and then configures it, in secure mode, to set the access policy to the memory card itself. | 02-26-2009 |
20090052657 | Method for Scalar Multiplication in Elliptic Curve Groups Over Binary Polynomial Fields for Side-Channel Attack-Resistant Cryptosystems - A method for transforming data with a secret parameter in an elliptic curve cryptosystem based on an elliptic curve defined over an underlying binary polynomial field, includes multiplying a point of the elliptic curve, and representing the data to be transformed by a scalar representing the secret parameter, wherein the multiplying includes performing at least one point addition operation and at least one point doubling operation on points of the elliptic curve. The point addition operation includes a first sequence of elementary field operations, and the point doubling operation includes a second sequence of elementary field operations, both the first and the second sequences of elementary field operations including a field inversion of coordinates of the elliptic curve points. A representation of the elliptic curve points in affine coordinates is provided and the first and second sequences of elementary field operations are balanced. The field inversion of coordinates is performed by the extended Euclidean algorithm and the balancing includes balancing the extended Euclidean algorithm by adding at least one dummy operation. | 02-26-2009 |
20090028059 | Method and System for Simulating a Communication Network, Related Network and Computer Program Product Therefor - A simulator system for simulating a wireless local area network in a combination of a wireless local area network and one or more 2G or 3G mobile communication networks includes a first set and a second set of access protocol simulation devices representative of wireless local area network apparatus implementing access protocols. The first set of access protocol simulation devices is representative of radio technology independent apparatus providing integration of the wireless local area network with the mobile communication network(s). The second set of access protocol simulation devices is representative of radio technology dependent apparatus present in the wireless local area network. The simulator is thus configured for simulating different types of wireless local area network technology in the wireless local area network by varying the access protocol simulation devices in the second set while maintaining the access protocol simulating devices in the first set. | 01-29-2009 |
20090016603 | Contour Finding in Segmentation of Video Sequences - A method of image processing includes: receiving at least one video frame of a video sequence, the at least one video frame including at least one foreground subject and a background; and processing the at least one video frame so as to separate the at least one foreground subject from the background. The processing includes: generating a pixel mask containing information indicating, for each pixel of the at least one video frame, whether the pixel belongs to the foreground subject or to the background, and determining contours of the at least one foreground subject on the pixel mask. The determining of the contours includes for each pixel in the at least one video frame; based on the information included in the pixel mask, determining whether at least one pixel border belongs to a contour of the at least one foreground subject, the at least one pixel border separating the pixel from a respective at least one adjacent pixel. | 01-15-2009 |
20080316998 | Method, and Related Mobile Communications System, for Providing Combinational Network Services - In a mobile communication system including a circuit-switched (CS) mobile communications network, a packet-switched (PS) mobile communications network and an interworking function adapted to enable a signaling exchange between the CS and PS mobile communications network, a method of providing combinational CS+PS services to mobile users includes receiving, at a serving network entity in the PS mobile communications network, a user request issued from a first user on the PS mobile communications network, the user request relating to combinational services and having the serving network entity managing the received request, wherein the managing of the received request includes controlling an establishment of a session in the CS mobile communication network through the interworking function. | 12-25-2008 |
20080315501 | Compact Structure Device for Extracting Sheets from Two Trays and Respective Printer | 12-25-2008 |
20080313901 | Method of Manufacturing an Ink Jet Printhead - This invention relates to a method of manufacturing an ink jet printhead, said printhead comprising a substrate and an ink barrier layer formed on said substrate, said method comprising the steps of: arranging a nozzle plate in which there is formed a plurality of nozzles suitable for the ejection of ink drops, said nozzle plate comprising an upper surface and a lower surface, said upper surface being on the side of the ejection of ink drops and said lower surface being opposite to said upper surface; depositing on said upper surface a first coating including a first layer comprising silicon carbide, while maintaining said nozzle plate at a first deposition temperature not larger than 250° C.; depositing on said lower surface a second coating including a second layer comprising silicon carbide, while maintaining said nozzle plate at a second deposition temperature not larger than 250° C.; positioning said nozzle plate onto said ink barrier layer by bringing into contact said second coating layer ( | 12-25-2008 |
20080311961 | Network Call Management in Case of Low Battery Condition of Mobile Communications Terminals - In a mobile communications system which includes a mobile communications network and a battery-powered mobile communications terminal, a method including: receiving, at a mobile communications network apparatus subsystem, a notification of a low battery charge condition from the battery-powered mobile communications terminal, and having the mobile communications network apparatus subsystem inform at least one second user, different from a first user using the battery-powered mobile communications terminal, based on the received notification. | 12-18-2008 |
20080214186 | System for Monitoring the Quality of Service in a Communication Network - Monitoring system includes a set of peripheral monitoring agents including processing functionalities housed in SIMS. Such processing functionalities, depending at least on operating conditions of each terminal and its respective SIMS, are able to adaptively establish a distribution of measuring functionalities included in the peripheral monitoring agents between the terminal itself (for example storing them in the related memory or multimedia card) and its respective SIM. | 09-04-2008 |
20080207174 | Method and device for handling telephone calls directed to non-reachable mobile phones - A method for handling telephone calls directed to a non-reachable mobile phone, and for handling data pertaining to them, wherein: I—provided the call diversion service to a different number, or the answering service, have not been enabled, the phone call is routed towards a phone call data management and storage device, when the mobile phone called user is non-reachable, dut to the fact that is in the detach mode or is temporarily out of the range reachable by radio-frequency signals; II—at the time mobile phone is again reachable, a notification is transmitted to the subscriber number of the telephone call; the notification being effected in the form of SMS, which contain phone call data of missed phone calls performed during the period while the mobile phone was not reachable. | 08-28-2008 |