Patent application number | Description | Published |
20140090001 | METHOD AND SYSTEM FOR IMPLEMENTATION OF AN INTERACTIVE TELEVISION APPLICATION - The present invention provides a method and system for implementation of an interactive television application. Particularly, the invention provides method and system for designing and implementation of synchronized interactive television applications using quick response (QR) code, wherein the quick response (QR) code is used to tag the broadcasted television content. More particularly, the invention provides method and system for decoding the quick response (QR) code at the receiver side to provide a universal resource locator (URL) which hosts augmented services for the content on the interactive television as well as on the secondary communication device. | 03-27-2014 |
20140101255 | SOCIAL NETWORK GRAPH BASED SENSOR DATA ANALYTICS - The present invention relates to a system and method of effective physical data aggregation and its logical analytics by way of utilizing socially interacting and networking platforms to create meaningful association and relevancy between the captured physical data. The physical data associated by social networking platforms results in creation of reduced data set for analytics and requires low processing requirements for application usage. | 04-10-2014 |
20140101691 | METHOD AND SYSTEM FOR AUTOMATIC TAGGING IN TELEVISION USING CROWD SOURCING TECHNIQUE - A method and system for tracking of objects in a video is disclosed. The method of the present invention enables user to indicate a boundary-box to the identified object of interest in the broadcast video on television or any other communication media. The object indicted in the boundary-box is than tracked by the users connected in a social community network in the upcoming video frames of the broadcasted video. The tracked object is then tagged by the users in the social community network. Further, the present invention enables augmentation of the tracked object in the video by extracting additional information from the online service providers. The augmentation and tagging of the object generates metadata related to the object. The metadata generated is stored on a server to track the object in future based on the metadata related to the object. | 04-10-2014 |
20140351337 | SYSTEM AND METHOD FOR IDENTIFYING AND ANALYZING PERSONAL CONTEXT OF A USER - A method and system for identifying personal context of a user having a portable mobile communication device at a particular location for deriving social interaction information of the user, wherein the user within a predefined range is identified using personal context of the user at the particular location and the identified personal context of the user is assigned with the confidence value. Further the current location information of the user within the particular location is obtained by fusing assigned confidence value. Further the proximity of the user in the current location is estimated by finding the accurate straight line distance between users. Further the two users having similar current location information at the particular location are grouped together with the predefined density criteria. Finally the social interaction information of the user is derived by multimodal sensor data fusion at the fusion engine and represented using a human network graph. | 11-27-2014 |
20140351790 | INTERNET OF THINGS (IOT) APPLICATION DEVELOPMENT - An application development system for development of Internet of Things (IoT) application includes a cataloging module to obtain an input from an application developer. The input comprises data related to the IoT application to be developed. The cataloging module further retrieves a plurality of reusable artefacts from a knowledge database based on the input. A recommendation module in the application development system recommends, to the application developer, artefacts from amongst the plurality of reusable artefacts, based at least on one of a feedback associated with each of the plurality of reusable artefacts, an expert analysis, and a combination of the expert analysis and the feedback. An association module in the application development system associates artefacts selected by the application developer with each other for development of the IoT application. | 11-27-2014 |
20140380264 | Computer Platform for Development and Deployment of Sensor-Driven Vehicle Telemetry Applications and Services - A computing platform for intelligent development, deployment and management of vehicle telemetry applications is disclosed herein. Further, the present disclosure provides a method and system that enables provision of Intelligent Transportation Service on the Cloud-based Platform that facilitates creation and deployment of vehicle telemetry applications configured for enabling traffic measurements, traffic shaping, vehicle surveillance and other vehicle related services. | 12-25-2014 |
20150019067 | SYSTEM AND METHOD FOR DETECTING ANOMALY ASSOCIATED WITH DRIVING OF A VEHICLE - Disclosed are a device, system and methods for detecting an anomaly associated with driving of a vehicle. Z-axis acceleration data is determined at the device. Based on the Z-axis acceleration data, jerk energies are computed and transmitted to the system for analysis. Further, the jerk energies are received for a plurality of trips at the system. Further, at the system, statistical analysis is performed on the jerk energies for determining a hazard rate for each trip of the plurality of trips. Then based on the hazard rate determined for each of the plurality of trips, a trend analysis is performed. Based on the trend analysis, any anomaly associated with the driving of the vehicle is detected. Further, the anomaly detected may be notified to a person associated with the device or with a monitoring terminal. | 01-15-2015 |
20150039226 | Indoor Positioning System - An indoor positioning system and method of localizing a person/object in an indoor environment by identifying the orientation and direction of a person/object to provide a true location of the person/object without navigation errors. The system comprises magnets disposed on a doorway to create a unique magnetic field; a wireless communication unit comprising a magnetometer sensor to sense perturbations in each of the unique magnetic fields in the event that the person/object with the wireless communication unit passes through the doorway, and generate corresponding signals; a processor receiving the signals and extracting data from the same; and a backend server wirelessly communicating with the wireless communication unit, the backend server processing the data sample received from the wireless communication unit to identify the opening and the wireless communication unit to localize the person/object. | 02-05-2015 |
20150198625 | ESTIMATION OF DIRECTION OF MOTION OF USERS ON MOBILE DEVICES - A mobile device and a method for estimation of direction of motion of a user are described. The mobile device comprises an inertial sensor to capture acceleration signals based on motion of the user and a direction estimation module. The direction estimation module determines direction of gravity based on filtering acceleration values obtained from captured the acceleration signals using a low-pass filter to identify a plane orthogonal to the direction of gravity. The plane orthogonal to the gravity comprises two orthogonal axes orthogonal to the direction of gravity. Further, displacement values are evaluated based on a user input for placement of the mobile device with respect to user's body, and integration of the acceleration values across the two orthogonal axes with respect to time. A direction of motion of the user is estimated based on a ratio of the displacement values along the two orthogonal axes. | 07-16-2015 |
20150199889 | Detection System - A detection system for detecting the presence and direction of a subject moving through a doorway is disclosed. The system comprises magnets disposed on the doorway, a communication device, typically a smartphone and a server. The magnets are positioned on the doorway to create a magnetic field across the doorway. When the subject having the smartphone on the body passes through the doorway, a magnetometer in the smartphone senses perturbations caused by the magnetic field and generates signals corresponding to the sensed perturbations and a processor of the smartphone processes the signals to detect the presence and direction of the subject through the doorway. The data generated by the processor and a unique identification associated with the smartphone is transmitted to the remotely located server. | 07-16-2015 |
20150257014 | COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR WI-FI BASED INDOOR LOCALIZATION - The present disclosure envisages a computer implemented system and method for Wi-Fi based indoor localization. The system includes a repository for storing attributes of the floor plan of an indoor area with respect to the zones on the floor plan. A communicating module receives a threshold number of data points from user devices located in the area. These data points include a plurality of Received Signal Strength Indicators (RSSI) captured from the access points positioned in the area. A k-means clustering is then performed on the data points for grouping the data points into âkâ number of clusters and a decision tree is built by following a condition based approach. Distance values are then calculated pertaining to the RSSIs stored at the decision tree, and zone circles are plotted. Zone of user presence is then determined by correlating the plotted zone circles upon the floor plan using maximum overlap property. | 09-10-2015 |
20160113531 | ESTIMATING PHYSIOLOGICAL PARAMETERS - A physiological parameter measurement device comprising a processor and a video processing module coupled to the processor to divide each of a plurality of frames of a video into a plurality of blocks, where the video is of a body part of a subject whose physiological parameter is to be determined. The video processing module further is to select a block having highest peak signal to noise ratio (PSNR) from amongst the plurality of blocks. Further, the video processing module is to extract a photoplethysmogram (PPG) signal from the video based on a block identifier associated with the block. The physiological parameter measurement device further comprises a signal enhancement module coupled to the processor, to process the PPG signal to obtain an enhanced PPG signal for determining a value of the physiological parameter for the subject. | 04-28-2016 |
Patent application number | Description | Published |
20100017638 | System and Method for Reducing Power Requirements of Microprocessors Through Dynamic Allocation of Datapath Resources - There is provided a system and methods for segmenting datapath resources such as reorder buffers, physical registers, instruction queues and load-store queues, etc. in a microprocessor so that their size may be dynamically expanded and contracted. This is accomplished by allocating and deallocating individual resource units to each resource based on sampled estimates of the instantaneous resource needs of the program running on the microprocessor. By keeping unused datapath resources to a minimum, power and energy savings are achieved by shutting off resource units that are not needed for sustaining the performance requirements of the running program. Leakage energy and switching energy and power are reduced using the described methods. | 01-21-2010 |
20100046370 | SYSTEM AND METHOD FOR FAST, RELIABLE BYTE STREAM TRANSPORT - Reliable byte stream transfer protocols play an important role in modern networks. The present invention implements such a protocol using credits for flow control and negative acknowledgements for reliable delivery. The credit mechanism uses credit transfer in installments and is immune to the losses or corruptions of intermediate credit installments. Negative acknowledgements are used to solicit the retransmission of data stream component. The present invention provides full compatibility at the programming interface with reliable byte transfer protocols, such as TCP, and also allows full interoperability among hosts running the aforesaid standard protocol or the protocol of the present invention. | 02-25-2010 |
20130061236 | SYSTEM AND METHOD FOR REDUCING POWER REQUIREMENTS OF MICROPROCESSORS THROUGH DYNAMIC ALLOCATION OF DATAPATH RESOURCES - There is provided a system and methods for segmenting datapath resources such as reorder buffers, physical registers, instruction queues and load-store queues, etc. in a microprocessor so that their size may be dynamically expanded and contracted. This is accomplished by allocating and deallocating individual resource units to each resource based on sampled estimates of the instantaneous resource needs of the program running on the microprocessor. By keeping unused datapath resources to a minimum, power and energy savings are achieved by shutting off resource units that are not needed for sustaining the performance requirements of the running program. Leakage energy and switching energy and power are reduced using the described methods. | 03-07-2013 |
20140082327 | CONTINUOUS RUN-TIME VALIDATION OF PROGRAM EXECUTION: A PRACTICAL APPROACH - Trustworthy systems require that code be validated as genuine. Most systems implement this requirement prior to execution by matching a cryptographic hash of the binary file against a reference hash value, leaving the code vulnerable to run time compromises, such as code injection, return and jump-oriented programming, and illegal linking of the code to compromised library functions. The Run-time Execution Validator (REV) validates, as the program executes, the control flow path and instructions executed along the control flow path. REV uses a signature cache integrated into the processor pipeline to perform live validation of executions, at basic block boundaries, and ensures that changes to the program state are not made by the instructions within a basic block until the control flow path into the basic block and the instructions within the basic block are both validated. | 03-20-2014 |
20140082329 | CONTINUOUS RUN-TIME VALIDATION OF PROGRAM EXECUTION: A PRACTICAL APPROACH - Trustworthy systems require that code be validated as genuine. Most systems implement this requirement prior to execution by matching a cryptographic hash of the binary file against a reference hash value, leaving the code vulnerable to run time compromises, such as code injection, return and jump-oriented programming, and illegal linking of the code to compromised library functions. The Run-time Execution Validator (REV) validates, as the program executes, the control flow path and instructions executed along the control flow path. REV uses a signature cache integrated into the processor pipeline to perform live validation of executions, at basic block boundaries, and ensures that changes to the program state are not made by the instructions within a basic block until the control flow path into the basic block and the instructions within the basic block are both validated. | 03-20-2014 |
20140325238 | SYSTEM AND METHOD FOR VALIDATING PROGRAM EXECUTION AT RUN-TIME - A pipelined processor comprising a cache memory system, fetching instructions for execution from a portion of said cache memory system, an instruction commencing processing before a digital signature of the cache line that contained the instruction is verified against a reference signature of the cache line, the verification being done at the point of decoding, dispatching, or committing execution of the instruction, the reference signature being stored in an encrypted form in the processor's memory, and the key for decrypting the said reference signature being stored in a secure storage location. The instruction processing proceeds when the two signatures exactly match and, where further instruction processing is suspended or processing modified on a mismatch of the two said signatures. | 10-30-2014 |
20140325239 | SYSTEM AND METHOD FOR VALIDATING PROGRAM EXECUTION AT RUN-TIME USING CONTROL FLOW SIGNATURES - A processor comprising: an instruction processing pipeline, configured to receive a sequence of instructions for execution, said sequence comprising at least one instruction including a flow control instruction which terminates the sequence; a hash generator, configured to generate a hash associated with execution of the sequence of instructions; a memory configured to securely receive a reference signature corresponding to a hash of a verified corresponding sequence of instructions; verification logic configured to determine a correspondence between the hash and the reference signature; and authorization logic configured to selectively produce a signal, in dependence on a degree of correspondence of the hash with the reference signature. | 10-30-2014 |
20150192978 | APPARATUS AND METHOD FOR EFFICIENT ESTIMATION OF THE ENERGY DISSIPATION OF PROCESSOR BASED SYSTEMS - A system and method of scheduling tasks, comprising receiving activity and performance data from registers or storage locations maintained by hardware and an operating system; storing calibration coefficients associated with the activity and performance data; computing an energy dissipation rate based on at least the activity and performance data; and scheduling tasks under the operating system based on the computed energy dissipation rate. | 07-09-2015 |
20150192979 | APPARATUS AND METHOD FOR EFFICIENT ESTIMATION OF THE ENERGY DISSIPATION OF PROCESSOR BASED SYSTEMS - A system and method of scheduling tasks, comprising receiving activity and performance data from registers or storage locations maintained by hardware and an operating system; storing calibration coefficients associated with the activity and performance data; computing an energy dissipation rate based on at least the activity and performance data; and scheduling tasks under the operating system based on the computed energy dissipation rate. | 07-09-2015 |
20150286821 | CONTINUOUS RUN-TIME VALIDATION OF PROGRAM EXECUTION: A PRACTICAL APPROACH - Trustworthy systems require that code be validated as genuine. Most systems implement this requirement prior to execution by matching a cryptographic hash of the binary file against a reference hash value, leaving the code vulnerable to run time compromises, such as code injection, return and jump-oriented programming, and illegal linking of the code to compromised library functions. The Run-time Execution Validator (REV) validates, as the program executes, the control flow path and instructions executed along the control flow path. REV uses a signature cache integrated into the processor pipeline to perform live validation of executions, at basic block boundaries, and ensures that changes to the program state are not made by the instructions within a basic block until the control flow path into the basic block and the instructions within the basic block are both validated. | 10-08-2015 |
20160117501 | SYSTEM AND METHOD FOR VALIDATING PROGRAM EXECUTION AT RUN-TIME - A pipelined processor comprising a cache memory system, fetching instructions for execution from a portion of said cache memory system, an instruction commencing processing before a digital signature of the cache line that contained the instruction is verified against a reference signature of the cache line, the verification being done at the point of decoding, dispatching, or committing execution of the instruction, the reference signature being stored in an encrypted form in the processor's memory, and the key for decrypting the said reference signature being stored in a secure storage location. The instruction processing proceeds when the two signatures exactly match and, where further instruction processing is suspended or processing modified on a mismatch of the two said signatures. | 04-28-2016 |
20160119148 | SYSTEM AND METHOD FOR VALIDATING PROGRAM EXECUTION AT RUN-TIME USING CONTROL FLOW SIGNATURES - A processor comprising: an instruction processing pipeline, configured to receive a sequence of instructions for execution, said sequence comprising at least one instruction including a flow control instruction which terminates the sequence; a hash generator, configured to generate a hash associated with execution of the sequence of instructions; a memory configured to securely receive a reference signature corresponding to a hash of a verified corresponding sequence of instructions; verification logic configured to determine a correspondence between the hash and the reference signature; and authorization logic configured to selectively produce a signal, in dependence on a degree of correspondence of the hash with the reference signature. | 04-28-2016 |
Patent application number | Description | Published |
20100201241 | THERMAL STORAGE SYSTEM USING ENCAPSULATED PHASE CHANGE MATERIALS IN LED LAMPS - A phase change material (PCM) is used as thermal storage for lighting systems. The PCM is placed in a thermally conductive container in close contact with the lighting system. As the PCM absorbs heat, it changes from a solid to a liquid state, but the temperature of the PCM is clamped at its melting point temperature. For LED-based systems, the PCM is selected to have a melting point such that the junction temperatures of the LEDs in the system are maintained at approximately their optimum operating temperature inside the lighting system housing. Because the thermal conductivity of the molten PCM is poor, a low thermal resistance heat flow path is provided from the PCM to the container. | 08-12-2010 |
20110134645 | LED LAMP ASSEMBLY WITH THERMAL MANAGEMENT SYSTEM - A lighting system is described. The lighting system includes a lamp and a first container including a first phase change material thermally connected to the lamp. Heat generated by the lamp during operation is conducted to the first phase change material. The system also includes a second container including a second phase change material thermally connected to the lamp. Heat generated by the lamp during operation is also conducted to the second phase change material, and the second phase change material has a transition point temperature lower than the transition point temperature of the first phase change material of the first container to account for a temperature drop between the second container and the first container. The lighting system also includes a temperature sensor for reducing lamp power if the lamp becomes too hot, and a mounting bracket which may also conduct heat away from the lamp. | 06-09-2011 |
20110303946 | THERMAL STORAGE SYSTEM USING ENCAPSULATED PHASE CHANGE MATERIALS IN LED LAMPS - A phase change material (PCM) is used as thermal storage for lighting systems. The PCM is placed in a thermally conductive container in close contact with the lighting system. As the PCM absorbs heat, it changes from a solid to a liquid state, but the temperature of the PCM is clamped at its melting point temperature. For LED-based systems, the PCM is selected to have a melting point such that the junction temperatures of the LEDs in the system are maintained at approximately their optimum operating temperature inside the lighting system housing. Because the thermal conductivity of the molten PCM is poor, a low thermal resistance heat flow path is provided from the PCM to the container. | 12-15-2011 |
20120307500 | LED LAMP ASSEMBLY WITH THERMAL MANAGEMENT SYSTEM - A lighting system is described. The lighting system includes a lamp and a first container including a first phase change material thermally connected to the lamp. Heat generated by the lamp during operation is conducted to the first phase change material. The system also includes a second container including a second phase change material thermally connected to the lamp. Heat generated by the lamp during operation is also conducted to the second phase change material, and the second phase change material has a transition point temperature lower than the transition point temperature of the first phase change material of the first container to account for a temperature drop between the second container and the first container. The lighting system also includes a temperature sensor for reducing lamp power if the lamp becomes too hot, and a mounting bracket which may also conduct heat away from the lamp. | 12-06-2012 |
20140168777 | LIGHT DIFFUSERS AND METHODS FOR MANUFACTURING - A linear light module having an optical coupling element and a light pipe is described. The optical coupling element receives light emitted by multiple light emitting diodes (LEDs) having different emission wavelengths and couples the light efficiently to a linear light pipe. The light from the LEDs is efficiently mixed by the optical coupling element and the light pipe to produce a linear light output that is uniform in color and intensity. Light diffusers can be used with the optical coupling element and light pipe at various locations to further enhance the uniformity of the emitted light. Novel techniques for manufacturing the light diffusers that use patterning of a suspension solution or injection molding are described. | 06-19-2014 |
20140169025 | SYSTEM AND METHOD FOR MIXING AND GUIDING LIGHT EMITTED FROM LIGHT EMITTING DIODES TO A LIGHT PIPE FOR EMISSION IN A LINEAR CONFIGURATION - A linear light module having an optical coupling element and a light pipe is described. The optical coupling element receives light emitted by multiple light emitting diodes (LEDs) having different emission wavelengths and couples the light efficiently to a linear light pipe. The light from the LEDs is efficiently mixed by the optical coupling element and the light pipe to produce a linear light output that is uniform in color and intensity. Diffusers can be used with the optical coupling element and light pipe at various locations to further enhance the uniformity of the emitted light. | 06-19-2014 |
20140169026 | THERMAL PATH FOR HEAT DISSIPATION IN A LINEAR LIGHT MODULE - A linear light module that uses a thermally conductive housing for dissipating heat generated by a lighting source within the housing is described. Light is thermally coupled away from the lighting source via a thermally conductive heating block. The heating block is thermally coupled to a thermally conductive heat pipe that runs along the length of the housing, where the length of the housing is substantially the same length as the linear light module. The housing is extruded to include a channel that runs the length of the housing for holding the heat pipe. Because the housing is long, the heat is easily conducted from the housing. | 06-19-2014 |
20160050723 | SYSTEM ARCHITECTURE OF A TUNABLE LAMP SYSTEM - Some embodiments of this disclosure operate a LED-based lamp module in conjunction with a controller, such as a general-purpose mobile device or other light control system. The operations can include producing light at a current correlated color temperature (CCT) from a light source comprising an LED set of different color LEDs; authenticating a connection between a mobile device and the LED-based lamp module; receiving a target CCT for the LED-based lamp module; determining a target LED driving condition that produces the target CCT based on a color mixing plan stored in the LED-based lamp module; and adjusting the current CCT towards the target CCT by adjusting a current LED driving condition towards the target LED driving condition. | 02-18-2016 |
Patent application number | Description | Published |
20090022977 | Combination structural support and thermal protection system - A dielectric material includes a network of nanosubstrates, such as but not limited to nanotubes, nanosheets, or other nanomaterials or nanostructures, a polymer base material or matrix, and nanoparticles constructed at least partially of an elemental metal. The network has a predetermined nanosubstrate loading percentage by weight with respect to a total weight of the dielectric material, and a preferential or predetermined longitudinal alignment with respect to an orientation of an incident electrical field. A method of forming the dielectric material includes depositing the metal-based nanoparticles onto the nanosubstrates and subsequently mixing these with a polymer matrix. Once mixed, alignment can be achieved by melt extrusion or a similar mechanical shearing process. Alignment of the nanosubstrate may be in horizontal or vertical direction with respect to the orientation of an incident electrical field. | 01-22-2009 |
20110254739 | Antenna with Dielectric Having Geometric Patterns - An antenna includes a ground plane, a dielectric disposed on the ground plane, and an electrically-conductive radiator disposed on the dielectric. The dielectric includes at least one layer of a first dielectric material and a second dielectric material that collectively define a dielectric geometric pattern, which may comprise a fractal geometry. The radiator defines a radiator geometric pattern, and the dielectric geometric pattern is geometrically identical, or substantially geometrically identical, to the radiator geometric pattern. | 10-20-2011 |
20110256197 | Preparation of Metal Nanowire Decorated Carbon Allotropes - In the method of embodiments of the invention, the metal seeded carbon allotropes are reacted in solution forming zero valent metallic nanowires at the seeded sites. A polymeric passivating reagent, which selects for anisotropic growth is also used in the reaction to facilitate nanowire formation. The resulting structure resembles a porcupine, where carbon allotropes have metallic wires of nanometer dimensions that emanate from the seed sites on the carbon allotrope. These sites are populated by nanowires having approximately the same diameter as the starting nanoparticle diameter. | 10-20-2011 |
Patent application number | Description | Published |
20130315816 | Bulk preparation of holey graphene via controlled catalytic oxidation - A scalable method allows preparation of bulk quantities of holey carbon allotropes with holes ranging from a few to over 100 nm in diameter. Carbon oxidation catalyst nanoparticles are first deposited onto a carbon allotrope surface in a facile, controllable, and solvent-free process. The catalyst-loaded carbons are then subjected to thermal treatment in air. The carbons in contact with the carbon oxidation catalyst nanoparticles are selectively oxidized into gaseous byproducts such as CO or CO | 11-28-2013 |
20140116616 | Composite Layer Forming System - A method and apparatus for forming a stack of composite layers into a desired shape is present. The stack of composite layers may be positioned on a tool and a number of compressible supports such that the stack of composite layers may be substantially flat on the tool and the stack of composite layers may be substantially flat on the number of compressible supports. A flexible sheet may be placed on top of the stack of composite layers. A vacuum load may be applied on the stack of composite layers on the tool and the number of compressible supports using the flexible sheet such that consolidation of the stack of composite layers occurs to form a desired shape on the tool and the number of compressible supports compress during forming of the desired shape. | 05-01-2014 |
20140203206 | Preparation of Metal Nanowire Decorated Carbon Allotropes - In the method of embodiments of the invention, the metal seeded carbon allotropes are reacted in solution forming zero valent metallic nanowires at the seeded sites. A polymeric passivating reagent, which selects for anisotropic growth is also used in the reaction to facilitate nanowire formation. The resulting structure resembles a porcupine, where carbon allotropes have metallic wires of nanometer dimensions that emanate from the seed sites on the carbon allotrope. These sites are populated by nanowires having approximately the same diameter as the starting nanoparticle diameter. | 07-24-2014 |
20150321428 | COMPOSITE LAYER FORMING SYSTEM - A method and apparatus for forming a stack of composite layers into a desired shape is present. The stack of composite layers may be positioned on a tool and a number of compressible supports such that the stack of composite layers may be substantially flat on the tool and the stack of composite layers may be substantially flat on the number of compressible supports. A flexible sheet may be placed on top of the stack of composite layers. A vacuum load may be applied on the stack of composite layers on the tool and the number of compressible supports using the flexible sheet such that consolidation of the stack of composite layers occurs to form a desired shape on the tool and the number of compressible supports compress during forming of the desired shape. | 11-12-2015 |
Patent application number | Description | Published |
20130132745 | SYSTEM AND METHOD FOR NETWORK ENABLED WAKE FOR NETWORKS - A method is provided in one example embodiment and includes receiving a message at a network element configured for routing packets, where the message directs a network device to change its power state; identifying the network device as being associated with a network for which the network element has responsibility; and communicating at least a portion of the message from the network element to the network device. | 05-23-2013 |
20130329584 | FINDING LATENCY THROUGH A PHYSICAL NETWORK IN A VIRTUALIZED NETWORK - Techniques are described for determining latency in a physical network that includes a number of network devices over which packets travel. A virtual network controller receives a plurality of messages from a plurality of network devices in a network, each of the messages including a packet signature comprising a hash of an invariant portion of an original packet that uniquely identifies the original packet, an identifier of one of the plurality of network devices from which the respective message was received, and a timestamp indicating a time an original packet was processed by the network device from which the respective message was received. The virtual network controller determines a latency of a physical network path in the network based on analysis of contents of the identified messages having a common packet signature. | 12-12-2013 |
20150113299 | SYSTEM AND METHOD FOR NETWORK ENABLED WAKE FOR NETWORKS - A method is provided in one example embodiment and includes receiving a message at a network element configured for routing packets, where the message directs a network device to change its power state; identifying the network device as being associated with a network for which the network element has responsibility; and communicating at least a portion of the message from the network element to the network device. | 04-23-2015 |
20150244617 | PHYSICAL PATH DETERMINATION FOR VIRTUAL NETWORK PACKET FLOWS - In general, techniques are described for configuring and managing virtual networks. For example, a distributed virtual network controller is described that configures and manages an overlay network within a physical network formed by plurality of switches. A plurality of servers are interconnected by the switch fabric, each of the servers comprising an operating environment executing one or more virtual machines in communication via the overlay networks. The servers comprises a set of virtual switches that extends the overlay network as a virtual network to the operating environment of the virtual machines. The controller may instruct the servers and the virtual switches to perform various operations, such as determining a physical network path taken by packets of a network packet flow, determining latency through the network, re-routing traffic in the virtual network due to network events, replicating traffic for multicasting, providing multi-tenant services to support multiple virtual networks, monitoring and logging traffic characteristics within the virtual networks and other operations. | 08-27-2015 |
20150304194 | FINDING LATENCY THROUGH A PHYSICAL NETWORK IN A VIRTUALIZED NETWORK - Techniques are described for determining latency in a physical network that includes a number of network devices over which packets travel. A virtual network controller receives a plurality of messages from a plurality of network devices in a network, each of the messages including a packet signature comprising a hash of an invariant portion of an original packet that uniquely identifies the original packet, an identifier of one of the plurality of network devices from which the respective message was received, and a timestamp indicating a time an original packet was processed by the network device from which the respective message was received. The virtual network controller determines a latency of a physical network path in the network based on analysis of contents of the identified messages having a common packet signature. | 10-22-2015 |