Yagawa
Keisuke Yagawa, Yokohama Kanagawa JP
Patent application number | Description | Published |
---|---|---|
20150060704 | WRITING DATA CORRECTING METHOD, WRITING METHOD, AND MANUFACTURING METHOD OF MASK OR TEMPLATE FOR LITHOGRAPHY - According to one embodiment, a writing data correction method includes preparing a data table having a combination of a pattern resizing amount, a beam irradiation amount, and a back-scattering coefficient for each pattern size; converting, into writing data, a layout obtained by dividing a design layout into a plurality of regions in accordance with each pattern size, resizing patterns of the design layout writing based on the pattern resizing amounts corresponding to the pattern sizes contained in the respective regions, and executing a proximity effect correction for the resized patterns contained in the respective regions based on the beam irradiation amounts and the back-scattering coefficients corresponding to the pattern sizes of the design layout contained in the respective regions, and on the beam irradiation amounts and the back-scattering coefficients corresponding to the pattern sizes of the design layout contained in the regions adjacent to the respective regions. | 03-05-2015 |
Kenichio Yagawa, Tokyo JP
Patent application number | Description | Published |
---|---|---|
20110032910 | Interface, apparatus, and method for communication between a radio eqipment control node one or more remote radio equipment nodes - An interface, apparatus, and method are described for communication between a radio equipment control (REC) node and first and second radio equipment (RE) nodes in a radio base station that transceives information over radio interface using multiple antenna carriers. The REC node is separate from and coupled to the first RE node by a first transmission link, and the second RE node coupled to the first RE by a second transmission link. Both control information and user information intended for communication between the REC node and the first RE node and the REC and the second RE node are conveyed over the first transmission link. The first RE node also conveys information between the REC and second RE node. Many advantageous features are described. | 02-10-2011 |
Kenji Yagawa, Ashiy-Shi JP
Patent application number | Description | Published |
---|---|---|
20130207811 | Article Transfer System - An article transfer system that allows the operator to easily notice that abnormality occurs in an abnormality detecting sensor for detecting abnormality and perform remedial work is provided. The article transfer system is adapted to display information indicating that the abnormality occurs on a display device as abnormality occurrence information, receive input of a result of determination by the operator on whether or not the abnormality indicated by the abnormality occurrence information occurs, and display information indicating that the detecting information received from the abnormality detecting sensor is incorrect on the display device when the operator inputs the result of determination that the abnormality indicated by the abnormality occurrence information does not occur with the abnormality detecting sensor detecting the abnormality. | 08-15-2013 |
Kenji Yagawa, Ashiya-Shi JP
Patent application number | Description | Published |
---|---|---|
20130238117 | Article Processing Facility and Method of Operation Thereof - An article processing facility includes a transport control device which controls operation of at least one article transport device, management control device which transmits to the transport control device a transport command for transporting the article from a transport origin to a transport destination based on transport data with identifying information, and a display control which causes a display device to display transport-data-associated information. The management control device manages and stores attribute information of the article such that the attribute information is associated with identifying information which identifies the transport data. When the transport-data-associated information is selected with a selection device, the display control obtains the attribute information associated with the identifying information of the transport data that corresponds to the transport-data-associated information from the management control device and displays the attribute information on the display device. | 09-12-2013 |
Shiro Yagawa, Wako JP
Patent application number | Description | Published |
---|---|---|
20140356748 | WASTE HEAT RECOVERY SYSTEM - A waste heat recovery system includes a fuel cell, a coolant circulation flow passage, a first heat exchanger, a waste heat recovery flow passage, a second heat exchanger, an upstream end of the waste heat recovery flow passage, and a downstream end of the waste heat recovery flow passage. The coolant circulation flow passage includes a first coolant supply flow passage, a first coolant exhaust flow passage, and a first bypass flow passage. The upstream end is connected to at least one of an inlet coolant reservoir and the first coolant exhaust flow passage at a position downstream of a connection point between the first coolant exhaust flow passage and the first bypass flow passage. The downstream end is connected to at least one of the inlet coolant reservoir, an outlet coolant reservoir, and the first coolant supply flow passage. | 12-04-2014 |
Yuichi Yagawa, Yokohama-Shi JP
Patent application number | Description | Published |
---|---|---|
20090043983 | METHOD AND APPARATUS FOR REDUCING THE AMOUNT OF DATA IN A STORAGE SYSTEM - Groups of volumes having a certain amount of commonality of data are identified within a storage system. For each group, the process defines a base volume, such as the volume containing the most commonality with the other volumes. For each volume in the group, the process extracts differential data between the base volume and each other volume, saves the differential data in a pool volume, and updates a mapping table. Commonality between volumes in the group is managed in the base volume, the pool volume, and the mapping table. Then the original volumes except the base volume and the pool volume may be deleted, and the original volumes are replaced with virtual volumes accessible through the mapping table. As a result, the amount of data in a storage system can be reduced while maintaining data integrity and accessibility. | 02-12-2009 |
Yuichi Yagawa, Yokohama JP
Patent application number | Description | Published |
---|---|---|
20090265495 | ACCESS RIGHT MANAGING METHOD FOR ACCESSING MULTIPLE PROGRAMS - Provided is an access right managing method for a resource of a storage system, in which a management computer stores access right definition information of the resource, and resource correspondence information including information on a management program which manages another resource related to the resource managed by the management program. In case of which receiving an updating request of an access right of the resource, the management computer updates an access right based on the updating request of the access right, selects a management program of the resource whose access right is requested to be updated based on the resource correspondence information, transmits an updating request of an access right for a relative resource to a management computer which executes the selected management program, and in case of which the access right updating request of the related resource is received, updates the access right of the relative resource. | 10-22-2009 |
20110219119 | ACCESS RIGHT MANAGING METHOD FOR ACCESSING MULTIPLE PROGRAMS - Provided is an access right managing method for a resource of a storage system, in which a management computer stores access right definition information of the resource, and resource correspondence information including information on a management program which manages another resource related to the resource managed by the management program. In case of which receiving an updating request of an access right of the resource, the management computer updates an access right based on the updating request of the access right, selects a management program of the resource whose access right is requested to be updated based on the resource correspondence information, transmits an updating request of an access right for a relative resource to a management computer which executes the selected management program, and in case of which the access right updating request of the related resource is received, updates the access right of the relative resource. | 09-08-2011 |
20120016957 | METHOD OF IMPROVING EFFICIENCY OF REPLICATION MONITORING - Provided is a copy pair monitoring method which is for a storage system having at least one host computer, at least one storage subsystem, and a management computer, the storage subsystem including volumes storing data requested by the host computer to be written, the management computer being accessible to the host computer and the storage subsystem. The copy pair monitoring method is characterized by including the steps of: obtaining every piece of copy pair definition information that is stored in the host computer; removing duplicate copy pair definition information from the whole copy pair definition information obtained; and collecting the copy pair status based on the obtained copy pair definition information from which duplicate copy pair definition information has been removed. | 01-19-2012 |
20120023233 | METHOD FOR EXECUTING MIGRATION BETWEEN VIRTUAL SERVERS AND SERVER SYSTEM USED FOR THE SAME - For each of multiple migration policies, a server system | 01-26-2012 |
20120084387 | METHOD AND PROGRAM FOR SUPPORTING SETTING OF ACCESS MANAGEMENT INFORMATION - In order to limit host computers permitted to control a storage area from host computers, provided is a storage management computer coupled to one or more host computers for providing services and one or more storage systems, in which the storage management computer judges whether the host computer is permitted to control the storage area based on data indicating the configuration information of the storage system and service management information for managing the services provided by the host computers, and in case of which it is judged that the host computer is permitted to control the storage area, the storage management computer sets access control data to permit the host computer to control the storage area. | 04-05-2012 |
20120254570 | METHOD OF IMPROVING EFFICIENCY OF REPLICATION MONITORING - Copy pair monitoring is provided for a storage system having plural host computers, at least one storage subsystem, and a management computer. The storage subsystem including volumes storing data requested by the host computer, the management computer being accessible to the host computer and the storage subsystem. The copy pair monitoring includes obtaining every piece of copy pair definition information that is stored in the host computer, removing duplicate copy pair definition information from the whole copy pair definition information obtained, and collecting the copy pair status based on the obtained copy pair definition information from which duplicate copy pair definition information has been removed. Each host computer is assigned a priority level, and, when more than one host computer includes the same copy pair, the host computer with the lowest priority obtains the copy pair information to reduce the load on the higher priority host computers. | 10-04-2012 |
Yuichi Yagawa, Tokyo JP
Patent application number | Description | Published |
---|---|---|
20100228998 | METHOD AND APPARATUS FOR SECURE DATA MIRRORING A STORAGE SYSTEM - A secure data mirroring capability in a storage system includes encrypting data blocks in a primary volume in preparation for a data mirroring operation. The encrypted data blocks are mirrored to a secure secondary volume. Host systems provide keys from which encryption keys are produced for encrypting the data blocks. Access to data on the secure secondary volume requires decryption using the key that was used to produce the encrypted data blocks. | 09-09-2010 |
Yuichi Yagawa, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20080229113 | Trusted Time Stamping Storage System - Data stored in a data storage system is hashed to generate a hash value. The hash value and a request for a time stamp are then sent to a time stamping authority. A time stamp token and/or a time stamp certificate is received from the time stamping authority. The time stamp token includes a time stamp and the hash value, and may be encrypted using a private key of the time stamping authority. The time stamp token and/or time stamp certificate is then stored with, for example, a reference to the data being stored in the data storage system. The time stamp token and/or time stamp certificate may then be used to validate the data being stored and the time stamp. | 09-18-2008 |
20090210642 | POINT IN TIME REMOTE COPY FOR MULTIPLE SITES - A method for copying data to multiple remote sites includes transmitting data from a first volume in a primary storage system to a back-up volume provided in a secondary storage system. The primary storage system is located at a primary site, and the secondary storage system is located at a first remote site from the primary site. The data from the first volume in the primary storage system is copied to a second volume in the primary storage system using a point in time (PiT) as a reference point of time for the copying. The second volume is provided with a first time consistent image of the first volume with respect to the reference point of time. The data from the second volume in the primary storage system is transferred to a third volume in a ternary storage system at a second remote site. The third volume is provided with a second time consistent image of the second volume with respect to the reference point of time, where the second time consistent image is a mirror image of the first time consistent image. The data from the third volume is transferred to a fourth volume in the ternary storage system. The fourth volume is provided with a third time consistent image. In the ternary storage, either of the third volume or fourth volume can always keep time consistent image of the first volume. | 08-20-2009 |