Patent application number | Description | Published |
20110066912 | METHOD AND SYSTEM TO INCREASE THE THROUGHPUT OF A HYBRID AUTOMATIC REPEAT REQUEST (HARQ) PROTOCOL - A method and system to increase the throughput of a HARQ protocol in a wireless network. When a station receives a downlink HARQ sub-burst that has an incorrect cyclic redundancy check, it determines if there is an overflow event of its buffer. If so, the station reduces the size of the HARQ sub-burst to be stored in the buffer and stores the resized HARQ sub-burst in the buffer. When the station transmits an uplink HARQ sub-burst, the station can reduce the size of the transmitted HARQ sub-burst if it exceeds the size of the buffer. The amount of buffer required in the station can also be reduced by representing each log likelihood ratio (LLR) value of each of one or more bits of each symbol of a HARQ burst with a number of quantization bits based on a metric sensitivity to noise of each bit of each symbol. | 03-17-2011 |
20120066562 | INCREASING HYBRID AUTOMATIC REPEAT REQUEST (HARQ) THROUGHPUT - In some embodiments, the invention involves increasing hybrid automatic repeat request (HARQ) throughput. In one embodiment, throughput may be increased by clearing the retransmission buffer at least one frame in advance, based on status received from the downlink device before a full acknowledgement. Another embodiment partitions HARQ bursts into two groups. A first group is for packet data units (PDUs) that are anticipated to be in error and a second group is for PDUs anticipated to be received correctly. Only PDUs that are anticipated to be in error, based on forward error correction (FEC) blocks, are to be saved in the retransmission buffer. Other embodiments are described and claimed. | 03-15-2012 |
20120254703 | APPARATUS AND METHODS FOR SELECTIVE BLOCK DECODING - Apparatus and methods for selective decoding of received code blocks are disclosed. An example method includes receiving a code block, determining a code block quality indicator for the received code block, and attempting to decode the received code block if the code block quality indicator is greater than or equal to a threshold. If the code block quality indicator is less than the threshold, the received code block is discarded without decoding attempts. The threshold may be a static or dynamic threshold. | 10-04-2012 |
20140169491 | TECHNIQUES TO MANAGE PROCESSING OF MULTIPLE INPUT MULTIPLE OUTPUT COMMUNICATIONS - An apparatus may include a channel estimation component to determine a channel estimation matrix H for a tone of a multiplicity of tones in a multiple input multiple output (MIMO) communications signal. The apparatus may further include a processor circuit coupled to the receiver component, and a flow selection component for execution on the processor circuit to calculate a figure of merit for power loss for the received tone based upon the channel estimation matrix, and based upon the calculated figure of merit, perform either a max-log calculation or a maximum likelihood calculation to determine a received signal metric, but not both calculations. Other embodiments are described and claimed. | 06-19-2014 |
20140247861 | FRACTIONAL SYMBOL BASED PHASE NOISE MITIGATION - Fractional symbol based phase noise mitigation, including methods and systems to determine phase noise trajectory, or indication of phase noise, for each of multiple fractional portions of a frequency domain symbol, and modify the symbol based on the phase noise trajectories of the subsets. Multiple correction hypotheses may be generated for each fractional portion of the symbol based on pre-defined phase noise hypotheses. The correction hypotheses may include frequency domain correction hypotheses. The correction hypotheses for a subset may be evaluated to select one of the phase noise hypotheses as the trajectory for the subset. The evaluation may include applying each correction hypothesis to a corresponding equalized frequency domain symbol to generate corresponding symbol hypotheses, computing a signal quality for each symbol hypothesis, and comparing the signal qualities. Signal qualities may be determined as error vector magnitudes, and may be based on all or a subset of corresponding symbol tones. | 09-04-2014 |
Patent application number | Description | Published |
20090299500 | SYSTEM ON CHIP FOR DIGITAL CONTROL OF ELECTRONIC POWER DEVICES - An integrated digital controller for controlling power electronic devices and method of its use, comprises an analog-to-digital converting scanner module for scanning analog data inputs and used to create digital data correlated with the analog inputs, a loop control module operative to receive the digital data ad used for controlling at least one control loop, and a pulse sequence generator (PSG) module used for generating a variety of fast, configurable, event-driven pulse sequences in cooperation with the PSG and scanner modules. The controller comprises optionally a CPU for managing various tasks and coordinate between the modules, means to create the events, and means for configuration and reconfiguration on-the-fly. The controller is preferably integrated in a semiconductor chip. | 12-03-2009 |
20100052731 | MULTIPLE CHANNEL BALLAST AND NETWORKABLE TOPOLOGY AND SYSTEM INCLUDING POWER LINE CARRIER APPLICATIONS - Control systems and methods for independent control of power systems, particularly lighting network branches, and separate control of individual branch components. Multi-branch systems comprise independently controllable branches that inter-communicate via PLC communications. In each branch, components such as ballasts, local control units, sensors, actuators, and repeaters, may exchange commands and queries independently of a branch remote control unit (BRCU). Alternatively, a BRCU may manage or arbitrate communications, or interact with other BRCUs, other control units and external management systems. Ballasts include a multi-channel ballast that enables close-loop control of individual fixtures, or of individual dimmable or non-dimmable lamps within a fixture. The close-loop control is facilitated by sampling circuits/sensors co-located with each controlled fixture or lamp. All controllers are preferably implemented using an integrated digital controller. The PLC communication is preferably carried out by a direct spread spectrum method that eliminates side lobes from a cross-correlation function, using an anti-collision protocol. | 03-04-2010 |
Patent application number | Description | Published |
20120087463 | PHOTON COUNTING AND ENERGY DISCRIMINATING DETECTOR THRESHOLD CALIBRATION - An imaging system includes an x-ray source, a detector that receives x-rays emitted from the x-ray source, a DAS configured to count photon hits in the detector that occur at photon energies above at least a low keV threshold, a medium keV threshold, and a high keV threshold, and a computer operably coupled to the DAS. The computer is programmed to vary each of the medium keV threshold and the high keV threshold over a continuous keV range during data acquisition to define low, medium, and high keV bins that are based on the low, medium, and high keV thresholds, obtain photon counts in the low, medium, and high keV bins in a plurality of keV threshold combinations, calculate a noise variance as a function of at least one of the keV thresholds, and identify a noise minimum and low, medium, and high keV thresholds that correspond thereto. | 04-12-2012 |
20130148873 | SYSTEM AND APPARATUS FOR CLASSIFYING X-RAY ENERGY INTO DISCRETE LEVELS - A system and apparatus for classifying x-ray energy into discrete levels include an imaging system comprising an x-ray source, a detector, and a DAS having a discriminator assembly configured to count photon hits in the detector. A computer causes the discriminator assembly to count photon hits in the detector having an energy level greater than or equal to first and second threshold levels during an imaging scan, wherein the second threshold level is distinct from the first threshold level. The computer further modifies the counted photon hits having an energy level greater than or equal to the first threshold level based on the counted photon hits having an energy level greater than or equal to the second threshold level and reconstructs an image based on the modified photon hits and based on the counted photon hits having an energy level greater than or equal to a second threshold level. | 06-13-2013 |
Patent application number | Description | Published |
20090235227 | Variability Layer for Domain-Specific Modeling Languages - Methods and systems are provided for adding variability support for a modeling language. Developers may utilize the added support to transform a model written in a preexisting domain-specific modeling language for product line development in which there is structural and configurational diversity. A variability layer is incorporated into the model, which permits product developers to better use the language to model product line variants. | 09-17-2009 |
20090276192 | Method and Computer Program Product for Visualizing Feature Model Information - A method, a system and a computer program product for visualizing feature model information. The method includes: (i) receiving a feature model that comprises multiple features, an architecture model that comprises multiple architectural elements, and information representative of features implemented by the architecture elements; and (ii) generating a hybrid model that comprises architectural model elements and visual indicators representative of feature model semantics. | 11-05-2009 |
20110145782 | INTEGRATING SOFTWARE COMPONENTS IN A SOFTWARE SYSTEM USING CONFIGURABLE GLUE COMPONENT MODELS - A method that includes: modeling a software system having pairs of coupled software components to yield a platform-independent model of pairs of respective platform-independent software component models associated with platform-specific software components; applying a materialization process to the platform-independent model to yield a platform-specific model by selecting respective concrete platform-specific software components for the software component models; analyzing the platform-specific model to identify mismatched pairs of concrete platform-specific software components; re-modeling the platform-specific model such that each identified mismatched pair becomes coupled together via a configurable glue component model which comprises interface maps usable to eliminate the mismatch; configuring the glue component models by determining, in response to a feedback from a user, code snippets associated with any of the interface maps; and transforming the configured glue component model into a computer code in the platform-specific language by assembling all determined code snippets into a single piece of code. | 06-16-2011 |
20120297361 | CONFIGURATION MANAGEMENT SYSTEM FOR SOFTWARE PRODUCT LINE DEVELOPMENT ENVIRONMENT - A system that includes: a configuration management system configured to receive resource updates submitted by developers of a product line; an update monitor configured, in manual monitoring, to mark each submitted resource update with respective variability data specified as relevant to the update submission, by the developer; and a tracer configured, in automatic monitoring, to trace portions of the updated resource into respective features or products of the product line, to determine variability data relevant to the update submission, wherein when an update request is initiated by the developer, the configuration management system is configured to associate the submitted resource updates with the update request based on common variability data, to provide resource updates on demand, based on variability data, wherein in automatic update, the configuration management system is configured to notify developers on resource updates, based on variability data common to the updated resource and the notified developers. | 11-22-2012 |
20130090962 | PROVIDING VARIABILITY AND MATERIALIZATION OVER LINKS CONNECTING PRODUCT LINE RESOURCES - A system for providing variability and materialization over links connecting product line resources is disclosed herein. The system may include a user interface configured to issue a request for a product-line resource given in a specified product configuration context, responsive to a user selection, wherein the product configuration contains one or more features of the feature model, wherein the product line resources are stored on one or more databases and are further connected between themselves via links, each associated with a respective variability, based on the feature model and the product line resources connected via the links; and a resources fetcher configured to retrieve the resources requested in view of the specified product configuration by providing the links associated with the variability of the specified product configuration. | 04-11-2013 |
Patent application number | Description | Published |
20100028134 | QUIET FAN INCORPORATING ACTIVE NOISE CONTROL (ANC) - An active noise control (ANC) system may be implemented to both sides of a fan, such that both directions of the noise emitting are treated to reduce the overall noise. The impact on airflow is minimal, and the technique is very effective in a broad range of low frequencies. Passive sound-absorbing materials may be included for attenuation of high frequencies. The resulting quiet fan produces a low level of noise compared to any other device based on fan, which produces the same capacity of airflow. The quiet fan may be incorporated in any mechanical system which requires airflow induction such as: computers, air conditioners, machines, and more. | 02-04-2010 |
20120288110 | Device, System and Method of Noise Control - Some demonstrative embodiments include devices, systems and methods of noise control. For example, a device may include a controller to control noise within a predefined noise-control zone, the controller is to receive a plurality of noise inputs representing acoustic noise at a plurality of predefined noise sensing locations, which are defined with respect to the predefined noise-control zone, to receive a plurality of residual-noise inputs representing acoustic residual-noise at a plurality of predefined residual-noise sensing locations, which are located within the predefined noise-control zone, to determine a noise control pattern, based on the plurality of noise inputs and the plurality of residual-noise inputs, and to output the noise control pattern to at least one acoustic transducer. | 11-15-2012 |
Patent application number | Description | Published |
20090199265 | ANALYTICS ENGINE - Aspects of the subject matter described herein relate to a mechanism for assessing security. In aspects, an analytics engine is provided that manages execution, information storage, and data passing between various components of a security system. When data is available for analysis, the analytics engine determines which security components to execute and the order in which to execute the security components, where in some instances two or more components may be executed in parallel. The analytics engine then executes the components in the order determined and passes output from component to component as dictated by dependencies between the components. This is repeated until a security assessment is generated or updated. The analytics engine simplifies the work of creating and integrating various security components. | 08-06-2009 |
20090328215 | SEMANTIC NETWORKS FOR INTRUSION DETECTION - Semantic networks are generated to model the operational behavior of an enterprise network to provide contextual interpretation of an event or a sequence of events that are observed in that specific enterprise network. In various illustrative examples, different semantic networks may be generated to model different behavior scenarios in the enterprise network. Without the context provided by these semantic networks malicious events may inherently be interpreted as benign events as there is typically always a scenario where such events could be part of normal operations of an enterprise network. Instead, the present semantic networks enable interpretation of events for a specific enterprise network. Such interpretation enables the conclusion that a sequence of events that could possibly be part of normal operations in a theoretical enterprise network is, in fact, abnormal for this specific enterprise network. | 12-31-2009 |
20100083375 | DETECTION ACCURACY TUNING FOR SECURITY - Aspects of the subject matter described herein relate to tuning detection components of a security system. In aspects, a history of alerts is collected. This history is then used together with knowledge about tunable objects of the system to determine parameters of the tunable objects that can be changed to improve detection of the system. Parameters of tunable objects are adjusted in a simulator that determines an effect on alerts in the history based on the adjusted parameters. A recommendation of one or more tuning actions may be provided together with information regarding the effect of each tuning action. | 04-01-2010 |
20100125912 | ESTIMATING AND VISUALIZING SECURITY RISK IN INFORMATION TECHNOLOGY SYSTEMS - Security risk for a single IT asset and/or a set of IT assets in a network such as an enterprise or corporate network may be estimated and represented in a visual form by categorizing risk into different discrete levels. The IT assets may include both computing devices and users. The risk categorization uses a security assessment of an IT asset that is generated to indicate the type of security problem encountered, the severity of the problem, and the fidelity of the assessment. The asset value of an IT asset to the enterprise is also assigned. Security risk is then categorized (and a numeric risk value provided) for each IT asset for different problem types by considering the IT asset value along with the severity and fidelity of the security assessment. The security risk for the enterprise is estimated using the numeric risk value and then displayed in visual form. | 05-20-2010 |
Patent application number | Description | Published |
20100077288 | Displaying a Form - A method for displaying a form, the method includes: displaying a form that comprises a first field that is partially hidden; and controlling a status of the first field in response to first field status control information; wherein the status is selected from a group consisting of fully hidden, partially hidden, fully viewable and deleted. | 03-25-2010 |
20100077325 | In Situ Editing of GUI Features - A graphical user interface development system offers a development module that displays GUI elements in an editing window. Respective attribute definition interfaces are provided exclusively within the window that enable in situ editing of attributes of the GUI elements, for example, in-line textual editing and toggling of Boolean attributes. Operator inputs are received via the attribute definition interfaces and attributes of corresponding GUI elements are modified in response to the inputs. | 03-25-2010 |
20100106547 | Automated workflow generation - A computer-implemented method for generating a workflow includes receiving via an interactive user interface operator input that defines a first document that is to be filled in by a user and comprises a decision component. A first state of the workflow corresponding to the first document and a transition associated with actuation of the decision component are automatically defined. A second document that is to be presented upon user selection of the decision component in the first document is generated, and a second state of the workflow that corresponds to the second document and is linked to the first state by the transition is generated. In response to the first and second documents and the decision component, software code that corresponds to the workflow is produced for use in a workflow engine. | 04-29-2010 |
20120096543 | AD HOC TRUST DELEGATION IN HUMAN BASED WORKFLOW SYSTEMS USING ONE TIME ACCESS KEY - A method of ad hoc trust delegation in human-based workflow systems using one-time access key is provided herein. The method may include the following steps: generating a unique access key to a workflow system in response to a delegation of trust to one or more users; associating the unique access key with a specified portion of a workflow within the workflow system; embedding the unique access key in a message sent to the one or more users; and providing the one or more users with a one-time access to the workflow system, such that the access is limited to the specified portion of the workflow, in response to applying the unique access key to the workflow system. | 04-19-2012 |
20120117117 | AIDING REPORT CONSTRUCTION BASED ON INFERENCE OF IMPLICIT APPLICATION LEVEL RELATIONSHIPS - A method of aiding report construction based on inference of implicit application level relationships is provided herein. The method may include the following steps: analyzing a model of a software application to yield data elements associated with base objects of the software application and relationships between the data elements; generating a list of reportable objects comprising the base objects and objects associated with the data elements and their relationships; ordering the reportable objects based on at least one of: content and usage of the reportable objects, to yield an ordered list; and presenting the ordered list in a form usable for building a report on the software application, wherein at least one of: the analyzing, the generating, the ordering, and the presenting, is carried out by at least one processor. | 05-10-2012 |
20130035956 | VISUALIZATION OF PATIENT TREATMENTS - Method, system, and computer program product for visualization of patient treatments are provided. The method includes: selecting a patient; retrieving data records of patients with similar conditions requiring treatment to the selected patient; and building a tree structure for display with nodes of treatment options and a temporal axis showing treatment results of the similar patients. The tree structure includes representing side effects of a treatment option at a node including a visualization of the strength of the side effect. The tree structure also includes providing edges between the nodes representing a length to progression of the condition requiring treatment. | 02-07-2013 |
20130132299 | USING NON-TEXTUAL NOTATION FOR DESCRIBING SERVICE RELATED HUMAN EXPERIENCE BASED ON A HIERARCHAL MODEL OF HUMAN NEEDS - A system for describing and analyzing service-related human experience in organizational or commercial environments based on a hierarchical model of needs (e.g. Maslow's hierarchy of needs) is provided herein. The system may include a classifier configured to classify experience states based on a predefined hierarchical model of needs, to yield a classification; a modeler configured to model a real-life environment into a model that includes a set of process instances associated with users; and an experience notation generator configured to: extract experience-related data associated with the users from the model, based on the classification; and represent the experience-related data of each one of the process instance as a non-textual time series, based on the classification. Optionally, the time series may be used to produce reports using an analyzer. The reports may be applied to a remedy engine to generate recommendations for improving the human experience. | 05-23-2013 |
20130218593 | USAGE OF ASSIGNED TREATMENT IN CLINICAL DECISION SUPPORT SYSTEMS - A computer-implemented method and apparatus for receiving a multiplicity of medical cases associated with a disease, each of the multiplicity of medical cases comprising medical features and assigned treatment, wherein the medical cases are divided into two or more groups such that each of groups is associated with a treatment assigned to medical cases classified into the group; and using the multiplicity of medical cases as divided into the two or more groups, to determine information. | 08-22-2013 |
20130219257 | TEXTUAL AND FORMATTED DATA PRESENTATION - A computer-implemented method and apparatus, the apparatus comprising an information receiving component, a text presentation component for presenting at least a first part of the information on a first pane as text; a form presentation component for presenting at least a second part of the information as a structured form comprising one or more fields on a second pane; and an update component for updating information displayed in the first pane or the second pane in response to changes entered to information displayed in the second pane or in the first pane, respectively. | 08-22-2013 |
20130226612 | FRAMEWORK FOR EVIDENCE BASED CASE STRUCTURING - A computerized method of generating evidence based case object for a decision support application. The method comprises providing a medical decision point, generating a decision point model mapping between a plurality of patient dependent clinical characteristics and a plurality of treatment options for the medical decision point according to a plurality of guidelines, estimating, using a processor, a plurality of treatment outcomes for each the treatment option, each the treatment outcome being estimated according to an analysis of medical records of a group of patients been at the medical decision point and having a subset of the plurality of patient dependent clinical characteristics selected from a plurality of subsets, and generating evidence based case object which receive patient data having patient dependent clinical characteristics matching one of the plurality of subsets and outputs an estimated prognosis based on a respective treatment outcome from the plurality of treatment outcomes. | 08-29-2013 |
20140129974 | PASSWORD PRESENTATION MANAGEMENT - According to some embodiments of the present invention, there is provided a method for revealing at least a portion of a disguised password on a display device. The method comprises receiving a plurality of password characters typed by a user, presenting a plurality of replacement symbols in a password field displayed by a display device of a terminal having a touch surface, each the replacement symbol being indicative of the reception of another of the plurality of password characters, detecting a fingertip which slides contiguously against the touch surface, and temporarily replacing the presentation of at least some of the plurality of replacement symbols with of the presentation of at least some of the plurality of password characters in a sequential manner correspondingly with a movement of the fingertip. | 05-08-2014 |
20140245233 | READABLE STRUCTURAL TEXT-BASED REPRESENTATION OF ACTIVITY FLOWS - A computerized method for converting a graphical representation of an activity flow to a structural text-based representation according to a plurality of human readability considerations, said computerized method comprising: converting a graphical representation of an activity flow to a structural text-based representation having a plurality of text elements which are related to one another in a hierarchical manner; identifying a subset of said plurality of text elements having an equal number of hierarchical degrees of separation from a root of said plurality of text elements; acquiring a plurality of human readability rules; ordering said subset of plurality of text elements by applying said plurality of human readability rules to said subset of plurality of text elements. | 08-28-2014 |
20150046787 | URL TAGGING BASED ON USER BEHAVIOR - A computerized method for tagging a resource locator based on user behavior statistics, comprising: collecting browsing data on at least one browsing action taken by each of a plurality of end users after browsing to a first web document, the first web document is referenced to by a resource locator in a second web document; analyzing, using a computerized processor, the browsing data to statistically identify a browsing characteristic of the first web document; and instructing the presentation of an indication of the browsing characteristic in association with the presentation of the second web document by a browser installed in a client terminal to a user browsing to the second web document. | 02-12-2015 |
20150135324 | HYPERLINK DATA PRESENTATION - A method of presenting hyperlink data. The method comprises identifying when a web browser running on a web browser client retrieves, in response to a web document data request submitted to a target server, a first web document data for displaying a first web document containing a hyperlink having a label for display and a target destination defining an address of a second web document, evaluating a risk from content of the second web document, generating by the web browser to a reference evaluation indication of the risk, and processing the web document data and the reference evaluation indication by the web browser for generating a presentation on the client terminal which combines the first web document data and the reference evaluation indication such that when the reference evaluation indication is presented when the label is presented by the web browser. | 05-14-2015 |