Patent application number | Description | Published |
20080218630 | Content-Dependent Scan Rate Converter with Adaptive Noise Reduction - A content-dependent scan rate converter with adaptive noise reduction that provides a highly integrated, implementation efficient de-interlacer. By identifying and using redundant information from the image (motion values and edge directions), this scan rate converter is able to perform the tasks of film-mode detection, motion-adaptive scan rate conversion, and content-dependent video noise reduction. Adaptive video noise reduction is incorporated in the process where temporal noise reduction is performed on the still parts of the image, thus preserving high detail spatial information, and data-adaptive spatial noise reduction is performed on the moving parts of the image. A low-pass filter is used in flat fields to smooth out Gaussian noise and a direction-dependent median filter is used in the presence of impulsive noise or an edge. Therefore, the selected spatial filter is optimized for the particular pixel that is being processed to maintain crisp edges. | 09-11-2008 |
20100246992 | Content-Dependent Scan Rate Converter with Adaptive Noise Reduction - A content-dependent scan rate converter with adaptive noise reduction that provides a highly integrated, implementation efficient de-interlacer. By identifying and using redundant information from the image (motion values and edge directions), this scan rate converter is able to perform the tasks of film-mode detection, motion-adaptive scan rate conversion, and content-dependent video noise reduction. Adaptive video noise reduction is incorporated in the process where temporal noise reduction is performed on the still parts of the image, thus preserving high detail spatial information, and data-adaptive spatial noise reduction is performed on the moving parts of the image. A low-pass filter is used in flat fields to smooth out Gaussian noise and a direction-dependent median filter is used in the presence of impulsive noise or an edge. Therefore, the selected spatial filter is optimized for the particular pixel that is being processed to maintain crisp edges. | 09-30-2010 |
Patent application number | Description | Published |
20150310450 | SYSTEMS AND METHODS FOR AWARDING GREEN SCORE TO BUSINESSES - Methods and systems are described for awarding a green score to a business using an automation and security system. According to at least one embodiment, an apparatus for awarding a green score to a business includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory which are executable by a processor to receive data related to at least one of energy usage and energy conservation practices by a business, determine whether the energy usage by the business meets threshold levels, determine an energy green score for the business, and display the energy green score. | 10-29-2015 |
20150310565 | TIME CLOCK FOR TRACKING EMPLOYEES - Methods and systems are described for employee time entry using an automation and security system. An apparatus for employee time entry includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory which are executable by a processor to request employee login at a control panel of an automation and security system at initiation of the employee's work shift, request employee logout at the control panel at completion of the employee's work shift, and collect data related to at least one of employee work hours, shift frequency, and employee cost. | 10-29-2015 |
20150327011 | EMPLOYEE TIME AND PROXIMITY TRACKING - Systems and methods for tracking employee time and proximity are described. According to at least one embodiment, a computer-implemented method to track employees in disclosed. The method may comprise registering a mobile device associated with an employee and recognizing when the mobile device associated with the employee enters a location. The method may include monitoring the mobile device once it enters the location and generating a report based at least in part on the monitoring. | 11-12-2015 |
20150347955 | MANAGING STAFFING REQUIREMENTS - A computer-implemented method to manage staffing requirements is disclosed. The method may comprise creating a network of employees. The method may also determine if a staffing level from the network of employees satisfies a threshold and may also poll one or more employees from the network of employees based in at least in part on the determining step. In some embodiments, the method may predict a potential staffing shortage. Predicting the staffing shortage may include identifying a physical location of a scheduled employee prior to a scheduled shift and determining the identified physical location of the scheduled employee is greater than a distance threshold. | 12-03-2015 |
20150363720 | AUTOMATED METRIC TRACKING FOR A BUSINESS - A computer-implemented method to automate metric tracking for a business is disclosed. The method may comprise observing customer data related to the business. The customer data may comprise at least one of a number of customers, customer purchases, or customer traffic. The observed customer data may be compared with a work schedule for personnel associated with the business. The work schedule may be based at least in part upon one or more scheduling parameters of the business. It may be determined if the observed customer data exceeds one or more scheduling parameters of the business. In some embodiments, at one personnel associated with the business may be alerted based upon the determining step when customer data exceeds one or more scheduling parameters. In some embodiments, the method may additionally alert a supervisor of the business based on the determining step when the customer data exceeds one or more scheduling parameters. | 12-17-2015 |
20150363735 | TRACKING CUSTOMER INTERACTIONS FOR A BUSINESS - A computer-implemented method to track customer interactions for a business is described. Movement of a customer at location associated with the business is tracked. At least one interaction between the customer and at least one personnel associated with the business is determined based at least in part on the tracking. The quality of the at least one interaction may be rated based at least in part on the determining. | 12-17-2015 |
20150363737 | PERFORMANCE SALES TRACKING FOR A BUSINESS - A computer-implemented method to automate sales performance analysis for a business is described. Voice over internet protocol (VoIP) data related to the business is observed. The observed VoIP data may be compared with at least one metric associated with the business. The metric may be based at least in part on one or more point of sale metrics, personnel metrics, or profit metrics of the business. The method may determine if the observed VoIP data satisfies the one or more metrics associated with the business. At least one personnel associated with the business may be alerted based at least in part on the determining. | 12-17-2015 |
20150363746 | AUTOMATED SCHEDULING FOR A BUSINESS - According to at least one embodiment, a computer-implemented method to automate scheduling for a business is disclosed. The method may comprise observing actions of at least one personnel associated with the business, wherein the action may comprise at least one of performance, timeliness, and reliability. The method may additionally comprise learning one or more scheduling parameters of the business based at least in part on the observing. The method may produce a work schedule for personnel associated with the business. The work schedule may be for a predetermined time period and being based at least in part on the learning. | 12-17-2015 |
Patent application number | Description | Published |
20090056257 | FOAMING OF SIMULATED STONE STRUCTURES - Simulated stone, masonry, and brick textured products such as siding having a foam backing or with the hollow parts injected with foam or molded with foam in one or more steps, obtained when specially selected materials are properly admixed and formed via molding techniques. The foam backing is applied to the product in either a one or two step process. The foam backing may be used on panels, wall structures, and other products that may have contoured and textured surfaces and may simulate the appearance of conventional building and construction materials including, but not limited to, stone, brick, masonry, concrete, stucco, wood, other conventional building materials, and combinations of any of these materials are disclosed. The foam backing provides improves thermal insulation, improved sound reduction, improved rigidity, and improved dimensional stability. The disclosed invention is not limited to products in the building or construction industries and may be applied in the manufacture of a wide variety of products in other industries. | 03-05-2009 |
20090062413 | COMPOSITION OF FILLERS WITH PLASTICS FOR PRODUCING SUPERIOR BUILDING MATERIALS - The use of high aspect fillers in the production of simulated stone, masonry and brick textured products such as cladding, siding, panels, or other building and construction materials. High aspect fillers increase the dimensional stability, rigidity, thermal and sound insulation. The high aspect fillers may be included into a matrix polymer with or without chemical bonding. The disclosed invention is not limited to products in the building or construction industries and may be applied in the manufacture of a wide variety of products in other industries. | 03-05-2009 |
20090062431 | COMPOSITION OF MATTER - Composition of matter for the production of simulated stone, masonry, and brick textured products. Exemplary embodiments of panels, wall structures, and other products may have contoured and textured surfaces and may simulate the appearances of conventional building or construction materials including, but not limited to, stone, bricks, masonry, concrete, stucco, wood, or other conventional building materials, and combinations of any of these materials are disclosed. The disclosed invention is not limited to products in the building or construction industries and may be applied in the manufacture of a wide variety of products in other industries. | 03-05-2009 |
20110185662 | FOAMING OF SIMULATED STONE STRUCTURES - Simulated stone, masonry, and brick textured products such as siding having a foam backing or with the hollow parts injected with foam or molded with foam in one or more steps, obtained when specially selected materials are properly admixed and formed via molding techniques. The foam backing is applied to the product in either a one or two step process. The foam backing may be used on panels, wall structures, and other products that may have contoured and textured surfaces and may simulate the appearance of conventional building and construction materials including, but not limited to, stone, brick, masonry, concrete, stucco, wood, other conventional building materials, and combinations of any of these materials are disclosed. The foam backing provides improves thermal insulation, improved sound reduction, improved rigidity, and improved dimensional stability. The disclosed invention is not limited to products in the building or construction industries and may be applied in the manufacture of a wide variety of products in other industries. | 08-04-2011 |
20120285109 | SIDING HAVING BACKER - A siding-plus-backer paneling unit that may provide a valley in the backer for improved adhesion strength, a ridge on another side of the backer for enabling ventilation, and a recess in an end of the backer for improved mating of adjacent paneling units. | 11-15-2012 |
20120285110 | GROOVED AND RIBBED BACKED PANELS - A backed paneling unit comprised of a backing portion that includes at least one of a depth portion and an elevated portion. An elevated portion and/or a depth portion may be formed using any suitable method including, but not limited to, molding, machining and heat stamping. Optionally, a backing portion may comprise a hydrophobic material. Such features may enable fluid flow (e.g., ventilation or liquid drainage) behind the backing portion. | 11-15-2012 |
Patent application number | Description | Published |
20120290263 | Evaluating And Predicting Computer System Performance Using Kneepoint Analysis - The present invention provides methods, systems, apparatus, and computer software/program code products adapted for operating in, or in conjunction with, an otherwise conventional computing system, and which enable evaluating, monitoring and predicting the performance of computer systems and individual elements or groups of elements within such computer systems. | 11-15-2012 |
20140350889 | EVALUATING AND PREDICTING COMPUTER SYSTEM PERFORMANCE USING KNEEPOINT ANALYSIS - The present invention provides methods, systems, apparatus, and computer software/program code products adapted for operating in, or in conjunction with, an otherwise conventional computing system, and which enable evaluating, monitoring and predicting the performance of computer systems and individual elements or groups of elements within such computer systems. | 11-27-2014 |
Patent application number | Description | Published |
20150199136 | METHOD AND SYSTEM FOR MONITORING AND ANALYZING QUALITY OF SERVICE IN A STORAGE SYSTEM - Methods and systems for monitoring quality of service (QOS) data for a plurality of storage volumes are provided. QOS data is collected for the plurality of storage volumes and includes a response time in which each of the plurality of storage volumes respond to an input/output (I/O) request. An expected range for future QOS data based on the collected QOS data is generated. The process then determines a deviation of each potential bully storage volume of a resource used by any victim storage volume, where the deviation of each bully storage volume is based on a number of current I/O requests (IOPS) that are processed by each potential bully storage volume, a forecasted value of TOPS and a predicted upper threshold TOPS value for each potential bully storage volume; and filters the potential bully storage volumes based on an impact of each potential bully storage volume. | 07-16-2015 |
20150199139 | METHOD AND SYSTEM FOR MONITORING AND ANALYZING QUALITY OF SERVICE IN A STORAGE SYSTEM - Methods and systems for monitoring quality of service (QOS) data for a plurality of storage volumes are provided. QOS data is collected for the plurality of storage volumes and includes a response time in which each of the plurality of storage volumes respond to an input/output (I/O) request. The process determines an average of N collected QOS data points at any given time; and iteratively analyzes each QOS data point to detect if a step-up or a step-down function has occurred, where a step-up function represents an unpredictable increase in value of a data point and a step-down function is an unpredictable decrease in value of the data point. A subset of the N QOS data points based on when the step-up function or step-down function occurs is selected for analysis and an expected range for future QOS data based on the subset of the N QOS data points is generated. | 07-16-2015 |
20150199141 | METHOD AND SYSTEM FOR MONITORING AND ANALYZING QUALITY OF SERVICE IN A METRO-CLUSTER - Methods and systems for inter-cluster storage system monitoring and analysis are provided. The method includes monitoring a non-volatile memory delay center for a first storage cluster having a first node and a second node configured to operate as a first high availability pair, where data for a write request to write data to the first node is also written to the second node as well as to a second cluster having a third node and a fourth node, where the third node and the fourth node are also configured to operate as a second high availability pair to store the data for the write request at one or both of the third and fourth node. The non-volatile memory delay center is used to monitor and detect latency due to any delay caused by a non-volatile memory of the first node used as a write cache. | 07-16-2015 |
20150199148 | METHOD AND SYSTEM FOR MONITORING AND ANALYZING QUALITY OF SERVICE IN A STORAGE SYSTEM - Methods and systems for monitoring quality of service (QOS) data for a plurality of storage volumes from a storage operating system of a storage system are provided. A performance manager collects the QOS data from the storage operating system and the QOS data includes a response time in which each of the plurality of storage volumes respond to an input/output (I/O) request. An expected range for future QOS data is generated based on the collected QOS data. The QOS data is monitored for each storage volume for determining whether a current QOS data for each storage volume is within the expected range. | 07-16-2015 |
20150199388 | METHOD AND SYSTEM FOR MONITORING AND ANALYZING QUALITY OF SERVICE IN A STORAGE SYSTEM - Methods and systems for identifying a victim storage volume from among a plurality of storage volumes based on a comparison of current Quality of Service (QOS) data with a dynamic threshold value that is based on historical QOS collected data for the plurality of storage volumes are provided. A performance manager collects the current and historical QOS data from a storage operating system of the storage system, which includes a response time in which each of the plurality of storage volumes respond to an input/output (I/O) request. The current and historical QOS data for the resources used by the victim storage volume are retrieved and compared with the current QOS data of each resource to an expected range based on the historical QOS data. Another storage volume is identified as a bully when its usage of a resource in contention contributes to creating the victim storage volume. | 07-16-2015 |
Patent application number | Description | Published |
20110209064 | SYSTEM AND METHOD FOR PROVIDING VIRTUAL DESKTOP EXTENSIONS ON A CLIENT DESKTOP - The system and method described herein may identify one or more virtual desktop extensions available in a cloud computing environment and launch virtual machine instances to host the available virtual desktop extensions in the cloud. For example, a virtual desktop extension manager may receive a virtual desktop extension request from a client desktop and determine whether authentication credentials for the client desktop indicate that the client desktop has access to the requested virtual desktop extension. In response to authenticating the client desktop, the virtual desktop extension manager may then launch a virtual machine instance to host the virtual desktop extension in the cloud and provide the client desktop with information for locally controlling the virtual desktop extension remotely hosted in the cloud. | 08-25-2011 |
20120130936 | SYSTEM AND METHOD FOR DETERMINING FUZZY CAUSE AND EFFECT RELATIONSHIPS IN AN INTELLIGENT WORKLOAD MANAGEMENT SYSTEM - The system and method for determining fuzzy cause and effect relationships in an intelligent workload management system described herein may combine potential causes and effects captured from various different sources associated with an information technology infrastructure with substantially instantaneous feedback mechanisms and other knowledge sources. As such, fuzzy correlation logic may then be applied to the combined information to determine potential cause and effect relationships and thereby diagnose problems and otherwise manage interactions that occur in the infrastructure. For example, information describing potential causes and potential effects associated with an operational state of the infrastructure may be captured and combined, and any patterns among the information that describes the multiple potential causes and effects may then be identified. As such, fuzzy logic may the be applied to any such patterns to determine possible relationships among the potential causes and the potential effects associated with the infrastructure operational state. | 05-24-2012 |
20120233625 | TECHNIQUES FOR WORKLOAD COORDINATION - Techniques for workload coordination are provided. An automated discovery service identifies resources with hardware and software specific dependencies for a workload. The dependencies are made generic and the workload and its configuration with the generic dependencies are packaged. At a target location, the packaged workload is presented and the generic dependencies automatically resolved with new hardware and software dependencies of the target location. The workload is then automatically populated in the target location. | 09-13-2012 |
20120271936 | TECHNIQUES FOR AUDITING AND CONTROLLING NETWORK SERVICES - Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service. | 10-25-2012 |
20120311344 | TECHNIQUES FOR SECURITY AUDITING OF CLOUD RESOURCES - Techniques for security auditing of cloud resources are provided. A virtual machine (VM) is captured and isolated when a session indicates that a session with the VM has terminated. Security checks are executed against the VM in the isolated environment. Results from the security checks are then reported. | 12-06-2012 |
20130055265 | TECHNIQUES FOR WORKLOAD TOXIC MAPPING - Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment. | 02-28-2013 |
20130283269 | SYSTEM AND METHOD FOR PROVIDING VIRTUAL DESKTOP EXTENSIONS ON A CLIENT DESKTOP - The system and method described herein may identify one or more virtual desktop extensions available in a cloud computing environment and launch virtual machine instances to host the available virtual desktop extensions in the cloud. For example, a virtual desktop extension manager may receive a virtual desktop extension request from a client desktop and determine whether authentication credentials for the client desktop indicate that the client desktop has access to the requested virtual desktop extension. In response to authenticating the client desktop, the virtual desktop extension manager may then launch a virtual machine instance to host the virtual desktop extension in the cloud and provide the client desktop with information for locally controlling the virtual desktop extension remotely hosted in the cloud. | 10-24-2013 |
20140143200 | SYSTEM AND METHOD FOR DETERMINING FUZZY CAUSE AND EFFECT RELATIONSHIPS IN AN INTELLIGENT WORKLOAD MANAGEMENT SYSTEM - The system and method for determining fuzzy cause and effect relationships in an intelligent workload management system described herein may combine potential causes and effects captured from various different sources associated with an information technology infrastructure with substantially instantaneous feedback mechanisms and other knowledge sources. As such, fuzzy correlation logic may then be applied to the combined information to determine potential cause and effect relationships and thereby diagnose problems and otherwise manage interactions that occur in the infrastructure. For example, information describing potential causes and potential effects associated with an operational state of the infrastructure may be captured and combined, and any patterns among the information that describes the multiple potential causes and effects may then be identified. As such, fuzzy logic may the be applied to any such patterns to determine possible relationships among the potential causes and the potential effects associated with the infrastructure operational state. | 05-22-2014 |
20140164606 | TECHNIQUES FOR AUDITING AND CONTROLLING NETWORK SERVICES - Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service. | 06-12-2014 |
20150120921 | TECHNIQUES FOR WORKLOAD TOXIC MAPPING - Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment. | 04-30-2015 |
Patent application number | Description | Published |
20110283946 | Combination storage, dispensing and feeding device for domestic animals - A feeding device that is comprised of an outer containment module and inner compression device, so configured that a multiplicity of disposable liners can be nested within the device and then be individually dispensed as required for each new feeding. The disposable liners are held inside the bowl without need for mechanical hinges, moving rims or retaining devices, but rather by a very careful cooperation between the size of the liners and an inwardly extending retaining flange or lip on the top inner edge of the containment module. This unique design allows the user to simply press liners into the device or peel them out, whenever the circumstances require it. The compression device in the bottom of the containment module supports the liners and continuously keeps the supply of disposable liners conveniently staged at the top edge of the module, as well as keeps them from moving during feedings. | 11-24-2011 |
20140352621 | Combination Storage, Dispensing and Feeding Device for Domestic Animals - A pet feeding device is disclosed having an outer container, an inner cavity within said container, a retaining ridge at the mouth of the inner cavity, a stacked array of at least one liner, and a compression device. The at least one liner can be nested within the inner cavity and then be individually disposed of as required for each new feeding. The at least one liner is held in the inner cavity by the retaining ridge and the compression device. The at least one liner is placed into device for restocking by pressing down into the inner cavity. The at least one liner can be removed for disposal individually. The compression device in bottom of cavity supports liners and continuously keeps supply of the at least one liner conveniently staged at top edge of cavity, as well as keeps them from moving during feedings. | 12-04-2014 |
Patent application number | Description | Published |
20090079498 | OFFSET CANCELLATION IN A CAPACITIVELY COUPLED AMPLIFIER - A method for calibrating an offset voltage of an amplifier used to amplify capacitively coupled communication signals is described. During this process, a common voltage is applied to one or more inputs to the amplifier. Next, an output of the amplifier is iteratively, measured, and charge is applied to the one or more inputs until the offset voltage is less than a pre-determined value. Note that applying the charge may involve applying a sequence of one or more charge pulses. | 03-26-2009 |
20090086768 | COMMUNICATING SIGNALS BETWEEN SEMICONDUCTOR CHIPS USING ROUND-ROBIN-COUPLED MICROPIPELINES - Embodiments of the present invention provide a system for transferring data between a receiver chip and a transmitter chip. The system includes a set of data path circuits in the transmitter chip and a set of data path circuits in the receiver chip coupled to a shared data channel. In addition, the system includes a set of asynchronous control circuits for controlling corresponding data path circuits in the transmitter chip and receiver chip. Upon detecting the transition of a control signal for an asynchronous control circuit in the transmitter chip, the asynchronous control circuit is configured to enable a transfer of data from the corresponding data path circuit in the transmitter chip across the data channel to a corresponding data path circuit in the receiver chip, and generate a control signal to cause a next asynchronous control circuit to commence the transfer of a data signal. | 04-02-2009 |
20090086793 | REPEATER CIRCUIT - A repeater circuit configured to duplicate or otherwise coordinate signal transitions between state conductors, such as for use in asynchronous communication systems. The repeater circuit may include a state node or other feature to facilitate enforcing or otherwise ordering transitioning of the state conductors. | 04-02-2009 |
20090315157 | PROTECTION FOR PROXIMITY ELECTRONICS AGAINST ELECTROSTATIC DISCHARGE - A system of protecting a proximity communication system against electrostatic discharge (ESD). The proximity communication system includes two chips, each having an array of electrical pads at its surface and covered by a thin dielectric layer such that capacitive coupling circuits are formed between the chips when they are joined together. In at least one of the chips, an additional protection pad is formed away from the array, and heavy protection circuitry is connected to it. Its surface is exposed through the dielectric surface over it such that, when an ESD aggressor approaches, the discharge occurs to the protection pad. | 12-24-2009 |
Patent application number | Description | Published |
20080238474 | BOOSTER CIRCUITS FOR REDUCING LATENCY - A booster circuit for reducing the nominal latency of a logic gate. The booster circuit includes a charge sharing mechanism to transfer a stored charge to the output of the logic gate in response to a logic state transition on the input of the logic gate. The transfer of stored charge also reduces the charge drawn from the supply during the output transition. | 10-02-2008 |
20080238509 | BOUNDING A DUTY CYCLE USING A C-ELEMENT - A duty cycle bounding circuit for restoring the unbounded duty cycle of a periodic signal such as a forwarded clock signal. The duty cycle bounding circuit comprises a state holding logic element, such as a C-element, and a delay line. The delay line feeds back an inverted version of the output of the state holding logic element to an input of the state holding logic element. The periodic signal is applied to another input of the state holding logic element. | 10-02-2008 |
20090085629 | DUAL EDGE TRIGGERED FLIP FLOPS - An implicitly pulsed dual edge triggered pulsed latch. The implicitly pulsed latch includes an overlapping clock generator and a transparency circuit designed to cause a transparent latch circuit to become transparent on each edge of a clock signal. A logic value on the input node of the latch is transferred to the output node of the latch in response to each clock edge transition. An explicitly pulsed dual edge triggered pulsed latch including a pulse generator and a transparent latch circuit. The explicitly pulsed latch includes a symmetrical pulse generator designed to cause the latch circuit to pass a logic value from the input node of the latch to the output node of the latch in response to a pulse on the clock node. | 04-02-2009 |
20090273362 | BOOSTER CIRCUITS FOR REDUCING LATENCY - A booster circuit for reducing the nominal latency of a logic gate. The booster circuit includes a charge sharing mechanism to transfer a stored charge to the output of the logic gate in response to a logic state transition on the input of the logic gate. The transfer of stored charge also reduces the charge drawn from the supply during the output transition. | 11-05-2009 |