Patent application number | Description | Published |
20110297875 | METHOD FOR MAKING LITHIUM BATTERY CATHODE MATERIAL - A method for making a lithium battery cathode material is disclosed. A mixed solution including a solvent, an iron salt material, a vanadium source material and a phosphate material is provided. An alkaline solution is added in the mixed solution to make the mixed solution have a pH value ranging from about 1.5 to 5. The iron salt, the vanadium source material and the phosphate material react with each other to form a plurality particles of iron phosphate precursor doped with vanadium which are added in a mixture of a lithium source solution and a reducing agent to form a slurry of lithium iron phosphate precursor doped with vanadium. The slurry of lithium iron phosphate precursor doped with vanadium is heat-treated. | 12-08-2011 |
20110297895 | METHOD FOR MAKING LITHIUM BATTERY CATHODE MATERIAL - A method for making a lithium battery cathode material is disclosed. A mixed solution including a solvent, an iron salt material, and a phosphate material is provided. An alkaline solution is added into the mixed solution until the mixed solution has a pH value ranging from about 1.5 to 5. The iron salt react with the phosphate material to form a plurality of iron phosphate precursor particles which are added in a mixture of a lithium source solution and a reducing agent to form a lithium iron phosphate precursor slurry. The lithium iron phosphate precursor slurry is heat-treated. | 12-08-2011 |
20110300292 | METHOD FOR MAKING LITHIUM BATTERY CATHODE COMPOSITE MATERIAL - A method for making a lithium battery cathode composite is provided. First, a plurality of lithium vanadium phosphate particles is provided. A lithium iron phosphate layer is then formed on an outer surface of each of the lithium vanadium phosphate particle by coating a lithium iron phosphate precursor slurry, thereby forming the lithium battery cathode composite. | 12-08-2011 |
20110300443 | ELECTRODE SLURRY OF LITHIUM BATTERY AND ELECTRODE OF LITHIUM BATTERY - The present disclosure relates to an electrode slurry of a lithium battery and an electrode formed from the electrode slurry. The electrode slurry includes an active component, a conductive agent, a binder, an organic solvent, and octylphenolpoly(ethyleneglycolether) | 12-08-2011 |
20110300446 | LITHIUM BATTERY CATHODE COMPOSITE MATERIAL - A lithium battery cathode composite material includes a number of composite particles. Each of the composite particles includes one lithium vanadium phosphate particle and a lithium iron phosphate layer. The lithium iron phosphate layer is disposed on a surface of the lithium vanadium phosphate particle. The lithium iron phosphate layer includes a number of uniformly disposed lithium iron phosphate particles. | 12-08-2011 |
20120027929 | ELECTRODE COMPOSITE MATERIAL, METHOD FOR MAKING THE SAME, AND LITHIUM ION BATTERY USING THE SAME - A method for preparing a electrode composite material includes providing an aluminum nitrate solution and introducing a number of electrode active material particles into the aluminum nitrate solution, mixing the plurality of electrode active material particles with the aluminum nitrate solution to form a mixture, and adding a phosphate solution into the mixture to react with the aluminum nitrate solution and form an aluminum phosphate layer on surfaces of the electrode active material particles. Lastly, the electrode active material particles with the aluminum phosphate layer formed on the surfaces thereof are heat treated. | 02-02-2012 |
20120028113 | ELECTRODE COMPOSITE MATERIAL, METHOD FOR MAKING THE SAME, AND LITHIUM ION BATTERY USING THE SAME - An anode composite material includes an anode active material particle having a surface and a continuous aluminum phosphate layer. The continuous aluminum phosphate layer is coated on the surface of the anode active material particle. The present disclosure also relates to a lithium ion battery that includes the cathode composite material. | 02-02-2012 |
20120028114 | ELECTRODE COMPOSITE MATERIAL, METHOD FOR MAKING THE SAME, AND LITHIUM ION BATTERY USING THE SAME - A cathode composite material includes a cathode active material particle having a surface, and a continuous aluminum phosphate layer coated on the surface of the cathode active material particle. A material of the cathode active material particle is spinel type lithium manganese oxide. The present disclosure also relates to a lithium ion battery and a method for making the cathode composite material. | 02-02-2012 |
20120028115 | ELECTRODE COMPOSITE MATERIAL, METHOD FOR MAKING THE SAME, AND LITHIUM ION BATTERY USING THE SAME - A cathode composite material includes a cathode active material particle having a surface, and a continuous aluminum phosphate layer coated on the surface of the cathode active material particle. A material of the cathode active material particle is layered type lithium nickel oxide. The present disclosure also relates to a lithium ion battery and a method for making the cathode composite material. | 02-02-2012 |
20120028118 | ELECTRODE COMPOSITE MATERIAL, METHOD FOR MAKING THE SAME, AND LITHIUM ION BATTERY USING THE SAME - A cathode composite material includes a cathode active material particle having a surface and a continuous aluminum phosphate layer. The continuous aluminum phosphate layer is coated on the surface of the cathode active material particle. The present disclosure also relates to a lithium ion battery including the cathode composite material. | 02-02-2012 |
20120028119 | ELECTRODE COMPOSITE MATERIAL, METHOD FOR MAKING THE SAME, AND LITHIUM ION BATTERY USING THE SAME - A cathode composite material includes a cathode active material particle having a surface and a continuous aluminum phosphate layer coated on the surface of the cathode active material particle. A material of the cathode active material particle is layered type lithium nickel manganese oxide. The present disclosure also relates to a lithium ion battery and a method for making the cathode composite material. | 02-02-2012 |
20120028120 | ELECTRODE COMPOSITE MATERIAL, METHOD FOR MAKING THE SAME, AND LITHIUM ION BATTERY USING THE SAME - A cathode composite material includes a cathode active material particle having a surface and a continuous aluminum phosphate layer coated on the surface of the cathode active material particle. A material of the cathode active material particle is layered type lithium nickel cobalt manganese oxide. The present disclosure also relates to a lithium ion battery and a method for making the cathode composite material. | 02-02-2012 |
20120164535 | LITHIUM TITANATE COMPOSITE MATERIAL, METHOD FOR MAKING THE SAME, AND LITHIUM ION BATTERY USING THE SAME - A lithium titanate composite material includes lithium titanate particles and an AlPO4/C composite layer disposed on a surface of the lithium titanate particles. The AlPO | 06-28-2012 |
20120164536 | LITHIUM TITANATE COMPOSITE MATERIAL, METHOD FOR MAKING THE SAME, AND LITHIUM ION BATTERY USING THE SAME - A lithium titanate composite material includes a lithium titanate particle and a double layered structure coated on a surface of the lithium titanate particle. The double layered structure includes a carbon layer directly disposed on the surface of the lithium titanate particle, and an AlPO | 06-28-2012 |
20120168696 | METHOD FOR MAKING ELECTRODE COMPOSITE MATERIAL - The present disclosure relates to a method for making an electrode composite material. In the method, a trivalent aluminum source, a doped element source, and electrode active material particles are provided. The trivalent aluminum source and the doped element source are dissolved in a solvent to form a solution having trivalent aluminum ions and doped ions. The electrode active material particles are mixed with the solution having the trivalent aluminum ions and doped ions to form a mixture. A phosphate radical containing solution is added to the mixture to react with the trivalent aluminum ions and doped ions, thereby forming a number of electrode composite material particles. The electrode composite material particles are heated. | 07-05-2012 |
20120171570 | ELECTRODE COMPOSITE MATERIAL AND LITHIUM ION BATTERY USING THE SAME - The present disclosure relates to an electrode composite material. The electrode composite material includes a number of electrode composite material particles. Each of the plurality of electrode composite material particles includes an electrode active material particle and a doped aluminum phosphate layer coated on a surface of the electrode active material particle. A material of the doped aluminum phosphate layer is a semiconducting doped aluminum phosphate. | 07-05-2012 |
20120326673 | COBALT OXIDE, COMPOSITE OF COBALT OXIDE, AND METHOD FOR MAKING THE SAME - A method for making a composite of cobalt oxide is disclosed. An aluminum nitrate solution is provided. Lithium cobalt oxide particles are introduced into the aluminum nitrate solution. The lithium cobalt oxide particles are mixed with the aluminum nitrate solution to form a mixture. A phosphate solution is added into the mixture to react with the aluminum nitrate solution and form an aluminum phosphate layer on surfaces of the lithium cobalt oxide particles. The lithium cobalt oxide particles with the aluminum phosphate layer formed on the surfaces thereof are heat treated to form a lithium cobalt oxide composite. The lithium cobalt oxide composite is electrochemical lithium-deintercalated at a voltage of Vx, wherein 4.5V12-27-2012 | |
20130004826 | LITHIUM ION BATTERY - The present disclosure relates to a lithium ion battery. The lithium ion battery cathode includes a cathode, a separator, an anode, and a nonaqueous electrolyte solution. The cathode includes a cathode current collector and a cathode material layer disposed on a surface of the cathode current collector. The cathode material layer comprises cathode active material, conductive agent, and adhesive uniformly mixed together. The cathode active material comprises cathode active material particles and AlPO | 01-03-2013 |
20130157144 | SOLID ELECTROLYTE AND LITHIUM BASED BATTERY USING THE SAME - A solid electrolyte includes an interpenetrating polymer network, a plasticizer and a lithium salt. The plasticizer and the lithium salt are dispersed in the interpenetrating polymer network. The interpenetrating polymer network includes CH | 06-20-2013 |
20130157145 | METHOD FOR MAKING SOLID ELECTROLYTE - A method for making a solid electrolyte includes the following steps. A first monomer, a second monomer, an initiator and a lithium salt are provided. Wherein the first monomer is R | 06-20-2013 |
20130157146 | SOLID ELECTROLYTE AND LITHIUM BASED BATTERY USING THE SAME - A solid electrolyte includes an interpenetrating polymer network and a lithium salt dispersed in the interpenetrating polymer network. The interpenetrating polymer network includes CH | 06-20-2013 |
20130158152 | INTERPENETRATING POLYMER NETWORK AND METHOD FOR MAKING THE SAME - An interpenetrating polymer network includes CH | 06-20-2013 |
20130224372 | METHOD FOR MAKING LITHIUM BATTERY CATHODE COMPOSITE MATERIAL OF LITHIUM IRON PHOSPHATE/LITHIUM VANADIUM PHOSPHATE COMPOSITE - A method for making a lithium battery cathode composite is provided. A mixed solution including a solvent, an iron salt, and a phosphate is provided. An alkaline solution is added in the mixed solution until the mixed solution has a pH value in a range from about 1.5 to about 5. The mixed solution is stirred to react the iron salt with the phosphate to form a number of iron phosphate precursor particles. The iron phosphate precursor particles are heated. A lithium source solution, a reducing agent, and the iron phosphate precursor particles are mixed to form a lithium iron phosphate precursor slurry. Outer surfaces of the lithium vanadium phosphate particles are coated with the lithium iron phosphate precursor. | 08-29-2013 |
20140295283 | COBALT OXIDE, COMPOSITE OF COBALT OXIDE, AND METHOD FOR MAKING THE SAME - A cobalt oxide is disclosed and is represented by a chemical formula of Co | 10-02-2014 |
Patent application number | Description | Published |
20090046605 | Uplink scheduling grant for time division duplex with asymmetric uplink and downlink configuration - Singalling uplink and downlink scheduling grants for a plurality of subframes in a time division duplex frame is addressed. In one aspect the allocated uplink subframes are divided into groups, so the number of groups equals the number of downlink subframes being allocated. Uplink grants for the groups are sent with the downlink grants, and for those groups that have more than one uplink subframe, the grant message also indicates which uplink subframes are included in that group. In another aspect there are two sets of grant messages, one for the uplink subframes and one for the downlink subframes. Each of the uplink grant messages is sent on a different uplink grant message, and there is a one-to-one correspondence between the uplink grant channel and the uplink subframe being scheduled by the grant. That correspondence may also be signalled with the grant messages. | 02-19-2009 |
20110281591 | METHOD AND DEVICE FOR DETERMINING ANTENNA COOPERATION SET, METHOD AND DEVICE FOR DETERMINING BASE STATION COOPERATION SET - A method and device for determining an antenna cooperation set, and a method and device for determining a base station cooperation set in the mobile communication field are provided. The method includes that a signal joint processing system obtains the channel quality between a mobile terminal and at least two base stations, determines the base stations, which are corresponding to the channel quality higher than the channel quality threshold, as the cooperation base station set of the mobile terminal. Because the channel quality between the mobile terminal and the antenna of each base station is used to determine the cooperation antenna set dynamically, therefore, the determined cooperation antenna set includes the antennae that have very strong interference to the mobile terminal, or the antennae that have been strongly interfered by the mobile station. By performing signal joint processing to the antennae, signal interference among adjacent cells can be reduced, better accuracy for detecting mobile terminal signals can be obtained, the accuracy for receiving signals by the mobile station is improved, and namely the communication quality between the mobile terminal and the base stations is improved. | 11-17-2011 |
20110292845 | METHOD AND EQUIPMENT FOR USER'S UPLINK DATA SCHEDULING - A method for user uplink data scheduling and an user equipment are applied in multi-period mode semi-persistent scheduling under 3GPP Long Term Evolution TDD configuration 2, the method includes setting the different offsets delta of periods for multi-period mode semi-persistent scheduling started by each uplink sub-frame in 10 ms radio frame, determining the periods of multi-period mode semi-persistent scheduling started by each uplink sub-frame in 10 ms radio frame according to the set delta, and scheduling the uplink new conveyed package data of user according to the periods of multi-period mode semi-persistent scheduling started by each uplink sub-frame in 10 ms radio frame. The method and user equipment can be used to increase the utilization ratio of resource, and are simple and easy to use. | 12-01-2011 |
20110310777 | METHOD AND EQUIPMENT FOR USER'S UPLINK DATA SCHEDULING - A user uplink data scheduling method and user equipment, which are applied to multiple-periodicity mode semi-persistent scheduling supporting Transmission Timing Interval (TTI) bundling in the second Downlink/Uplink (DL/UL) timing interval proportion configuration mode (Time Division Duplex (TDD) DL/UL subframe configuration 1) in a Third Generation Partnership Project (3GPP) Long Term Evolution (LTE) TDD system. The user uplink data scheduling method includes the steps of: acquiring an indication message transmitted from a base station for indicating user uplink data based on the multiple-periodicity mode semi-persistent scheduling; setting a periodicity offset of the multiple-periodicity mode semi-persistent scheduling; determining the periodicities of the multiple-periodicity mode semi-persistent scheduling of per two adjacent TTI bundles according to the set offset; scheduling user uplink new transmission packet data according to the determined periodicities of the multiple-periodicity mode semi-persistent scheduling. The problem that the new-transmission packet and the re-transmission packet of the same user of the multiple-periodicity semi-persistent scheduling conflict is solved, and signal overhead is reduced when TTI bundling supports the VoIP service and so on. | 12-22-2011 |
20120135773 | Signal Transmission Method and Related Device Thereof - A signal transmission method and related mobile terminal and base station thereof. The method includes: the base station determines a special transmit time interval (TTI) in a downlink carrier (S | 05-31-2012 |
20120188888 | METHOD AND DEVICE FOR CONTROLLING THE DOWNLINK TRANSMISSION IN THE COORDINATED MULTI-POINT TRANSMISSION SYSTEM - A method for controlling the downlink transmission and a device for the signal associated processing in the coordinated multi-point transmission system are provided, which relate to the mobile communication technology, for optimizing the downlink transmission control in the coordinated multi-point transmission system. The embodiment aims at the coordinated multi-point transmission system, and in the base station side according to the SINR1 level of the frequency domain resource block fed back by the user, the mating result of the user, the associated resource allocation result and the pretreatment weight value result, determines the Modulation and Coding Scheme (MCS) level of the scheduled user channel to provide the accuracy of the MCS level, thus optimizing the downlink resource configurations, further increasing the throughput of the system. | 07-26-2012 |
20120294210 | METHOD AND DEVICE FOR SCHEDULING DOWNLINK SUBFRAMES - A method and device for scheduling downlink subframes are disclosed in the embodiments of the present invention, in which a control section of one subframe schedules data sections of one or more other subframes, making it possible to greatly save an overhead of control signaling to thereby have more resources for transmission of data and improve the performance of a system as compared with traditional scheduling of a single subframe. | 11-22-2012 |
20130021999 | NETWORKING METHOD AND DEVICE FOR FREQUENCY REUSE - The present invention provides a networking method and device for frequency reuse. The method comprises dividing a total available frequency band of a system into a plurality of sub-bands, and allocating the divided sub-bands to each cell while ensuring that the sub-bands allocated to at least two cells are overlapped with each other. As a result, as compared with the networking mode in the prior art in which the sub-bands are orthogonal to each other and a frequency reuse factor is N (greater than 1), the frequency utilization rate of the system is improved. Meanwhile, as compared with the networking mode in which the frequency reuse factor is 1 in prior art, the co-channel interference between the cells is reduced. | 01-24-2013 |
20130136092 | SENDING METHOD AND DEVICE FOR 8-ANTENNA DOWNLINK CONTROL CHANNEL - A method for an 8-antenna downlink control channel, is described. the method includes virtualizing a first pair and a third pair of dual-polarized antennas as a first port, and virtualizing a second pair and a fourth pair of dual-polarized antennas as a second port. The weighted values of the broadcast right of the four antennas in the first port satisfy that the weighted value of one antenna is +1 and the weighted values of the other three antennas are −1, or the weighted value of one antenna is −1 and the weighted values of the other three antennas are +1, and weighted values of the broadcast right of the four antennas in the second port satisfy that the weighted value of one antenna is +1 and the weighted values of the other three antennas are −1. | 05-30-2013 |
20130308491 | METHOD AND BASE STATION FOR ADJUSTING DOWNLINK GRANT PHYSICAL DOWNLINK CONTROL CHANNEL OF UE - The present invention provides a method and a base station for adjusting a downlink grant physical downlink control channel of a UE. The method comprises: receiving a signal transmitted on an uplink resource corresponding to a current downlink grant physical downlink control channel from the UE; judging whether or not the UE has received the downlink grant physical downlink control channel successfully in accordance with the received signal; and determining the number of CCEs occupied by the downlink grant physical downlink control channel and/or a transmission power of the downlink grant physical downlink control channel in accordance with the judgment result. | 11-21-2013 |
20130315093 | METHOD AND BASE STATION FOR ADJUSTING UPLINK GRANT PHYSICAL DOWNLINK CONTROL CHANNEL OF UE - The disclosure provides a method and a base station for adjusting an uplink grant physical downlink control channel of a UE adaptively. The method includes: receiving a physical uplink shared channel transmitted on an uplink resource indicated by a current uplink grant physical downlink control channel from the UE; judging whether or not the UE has received the uplink grant physical downlink control channel successfully in accordance with the received physical uplink shared channel; and determining the number of control channel elements CCEs occupied by the uplink grant physical downlink control channel and/or a transmission power of the uplink grant physical downlink control channel in accordance with the judgment result. | 11-28-2013 |
20140341165 | METHOD AND APPARATUS FOR ACKNOWLEDGEMENT SIGNALING - An approach is provided for providing acknowledgement signaling. A transmission failure associated with data from a user equipment is determined. An allocation message is generated for signaling of the transmission failure to the user equipment. The allocation message provides allocation of resource for retransmission of the data. | 11-20-2014 |
Patent application number | Description | Published |
20080288258 | METHOD AND APPARATUS FOR SPEECH ANALYSIS AND SYNTHESIS - The present invention provides a speech analysis method comprising steps of obtaining a speech signal and a corresponding DEGG/EGG signal; regarding the speech signal as the output of a vocal tract filter in a source-filter model taking the DEGG/EGG signal as the input; and estimating the features of the vocal tract filter from the speech signal as the output and the DEGG/EGG signal as the input, wherein the features of the vocal tract filter are expressed by the state vectors of the vocal tract filter at selected time points, and the step of estimating is performed using Kalman filtering. | 11-20-2008 |
20120290299 | Translating Between Spoken and Written Language - Techniques for converting spoken speech into written speech are provided. The techniques include transcribing input speech via speech recognition, mapping each spoken utterance from input speech into a corresponding formal utterance, and mapping each formal utterance into a stylistically formatted written utterance. | 11-15-2012 |
20130198761 | Intelligent Dialogue Amongst Competitive User Applications - A method, an apparatus and an article of manufacture for enabling communication between at least two computer applications that is observable to a user. The method includes obtaining a description of functions for each of the at least two computer applications, comparing the description of functions for each of the at least two computer applications, generating a dialog between the at least two applications based on the comparing of the description of functions for each of the at least two computer applications, and making the dialog available to a user. | 08-01-2013 |
20130268270 | Forced/Predictable Adaptation for Speech Recognition - A method is described for use with automatic speech recognition using discriminative criteria for speaker adaptation. An adaptation evaluation is performed of speech recognition performance data for speech recognition system users. Adaptation candidate users are identified based on the adaptation evaluation for whom an adaptation process is likely to improve system performance. | 10-10-2013 |
20140039691 | Multi-Dimensional Heating and Cooling System - Methods and system for facilitating multi-dimensional personal heating and cooling. User information is used as a mean to configure the temperature in a surrounding environment, thereby facilitating comfort for a user and, in the case wherein multiple users are accessing an area, classifying the area into a number of regions and maintaining each region at a different temperature and guiding the users to desired regions. | 02-06-2014 |
20140278410 | TEXT PROCESSING USING NATURAL LANGUAGE UNDERSTANDING - Techniques for converting spoken speech into written speech are provided. The techniques include transcribing input speech via speech recognition, mapping each spoken utterance from input speech into a corresponding formal utterance, and mapping each formal utterance into a stylistically formatted written utterance. | 09-18-2014 |
Patent application number | Description | Published |
20100211588 | Context-Aware Query Suggestion By Mining Log Data - Techniques described herein describe a context-aware query suggestion process. Context of a current query may be calculated by analyzing a sequence of previous queries. Historical search data may be mined to generate groups of query suggestion candidates. Using the context of the current query, the current query may be matched with the groups of query suggestion candidates to find a matching query suggestion candidate, which may be provided to the user. | 08-19-2010 |
20110179013 | Search Log Online Analytic Processing - A suffix-tree index may be constructed from search engine search logs. This suffix-tree is scalable and suitable for use in a distributed computing environment. Data mining against the data may proceed with functions including a forward search, backward search, and/or query session retrieval. | 07-21-2011 |
20110208730 | CONTEXT-AWARE SEARCHING - A model generated from search log data predicts a hidden state based on a query to determine a context of the query, such as for providing re-ranked search results, query suggestions and/or URL recommendations. | 08-25-2011 |
20110270819 | CONTEXT-AWARE QUERY CLASSIFICATION - Query classification techniques attempt to classify user search queries in order to better understand user search intent. Understanding a user's search intent allows search engines to provide relevant content tailored to the user's interest. Unfortunately, current classification techniques do not take into account contextual information. Accordingly, as provided herein, a target query may be classified based upon contextual information. In particular, features may be extracted from contextual information and/or other sources. For example, features may be extracted from the target query, related queries, and/or invoked search results of the related queries. In this way, the target query may be classified based upon other queries performed by the user and/or search results of the queries the user found interesting. In addition, a CRF model may be utilized in classifying the target query by providing generalized parameters learned from labeled query sessions. | 11-03-2011 |
20120290575 | MINING INTENT OF QUERIES FROM SEARCH LOG DATA - Architecture that mines intent of a query from search log data. For example, for a given query, the intent, the major URLs for the intent, and intent attributes, are found. The input is search log data and the output is a database that contains the intent of queries mined from the log data. Data mining techniques are employed to discover major intents of queries in the click-through log data of a search engine. For each query, its expanded queries are created and utilized, as well as co-clicks of the original query and expanded queries in the log data. For each query, clustering is performed on the co-click data of the query and expanded queries to find the major intents of the query. | 11-15-2012 |
Patent application number | Description | Published |
20090239758 | METHODS, MICROARRAY, AND KITS FOR DETECTION OF DRUG RESISTANCE GENES IN GRAM-NEGATIVE BACTERIA - The present invention provides kits and microarrays containing primer pairs for amplifying drug resistance genes and/or probes for detection of drug resistance genes. Also provided are methods of detecting drug resistance genes using kits and microarrays described herein. | 09-24-2009 |
20100300335 | AC Plasma Ejection Gun, the Method for Supplying Power to it and Pulverized Coal Burner - An AC plasma ejection gun, the method for supplying power to the gun and a pulverized coal burner are provided. The ejection gun comprising: a power supply device, having a live wear and a null wear; an electric front electrode, inside of which a front chamber is set, a nozzle connected with said front chamber is set at the outlet of the front electrode, an air inlet pipe connected with said front chamber is set at the inlet of the front electrode, and the front electrode is connected with said null wire; an electric rear electrode, connected with the inlet of said front electrode by an insulated ring, there is a gap between the electric rear electrode and said front electrode, said rear electrode is connected with the live wire, a spinning air inlet ring is set at the outside of the gap between said front electrode and said rear electrode, compressed air from the air inlet pipe passes the spinning air inlet ring and enters into the front chamber; wherein, the arc between said front electrode and said rear electrode discharges, ionizing the compressed air into plasma in the gap between said front electrode and said rear electrode, and the plasma is ejected out of the nozzle from the front chamber. The ejection gun in present invention can work with small current and large power, so that the life of the plasma ejection gun is prolonged. | 12-02-2010 |
20130177228 | METHOD FOR REGISTERING FUNCTION MRI DATA - A method for registering functional MRI data, comprising: computing the functional connectivity pattern for every voxel in its given spatial neighborhood for every fMRI image; extracting features invariant to spatial location of the neighboring voxels based on the functional connectivity patterns; constructing similarity metric between voxels of different images based on the extracted features, and using fluid-like demons registration model to spatial normalize the fMRI data. The present invention tries to exploit the multi-range functional connectivity information of the fMRI data, and to register functional MR images based on the extracted spatial-location-invariant features. The present invention is robust against local spatial perturbations and does not depend on the assumption that functional signals of different subjects are synchronic, hence can be applied to resting-state fMRI data, and can achieve a statistically significant improvement in functional consistency across subjects. | 07-11-2013 |
20130267436 | LUMINOPHORE-LABELED MOLECULES COUPLED WITH PARTICLES FOR MICROARRAY-BASED ASSAYS - A microarray-based assay is provided, which is used for analyzing molecular interactions, including polynucleotides, polypeptides, antibodies, small molecule compounds, peptides and carbohydrates. Such method comprises labeling a target molecule with a luminophore, coupling the target molecule to a particle, and binding to a probe molecule on microarray. In particular, multiplexed genetic analysis of nucleic acid fragments can be implemented. Specific genes, single nucleotide polymorphisms or gene mutations, such as deletions, insertions, and indels, can be identified. This technology, with high sensitivity, enables the detection and interpretation of molecular interactions in an efficient way. | 10-10-2013 |
Patent application number | Description | Published |
20100146355 | Retransmission Method, Communication System, and Transmission Device - Disclosed are a retransmission method and a communication system which can realize a preferable trade-off between the feedback information amount and the error ratio characteristic. In the communication system, an encoding unit ( | 06-10-2010 |
20100192037 | RADIO COMMUNICATION APPARATUS AND REDUNDANCY VERSION TRANSMISSION CONTROL METHOD - Optimal error rate performance can always be obtained and the number of retransmissions can be minimized in IR-type HARQ using an LDPC code as an error correction code. An LDPC encoding section | 07-29-2010 |
20100251062 | ENCODING METHOD AND TRANSMISSION DEVICE - Provided is an encoding method including: a step of extending a bidiagonal line of a basic matrix of m rows and n columns in the direction of a bidiagonal line according to an encoding ratio 1/k of the spread code (wherein k=3, 4, 5, . . . , k0) set in the LDPC code inspection matrix so as to constitute an extended matrix of the bidiagonal line structure; a step of moving a first non-zero element of the parity bit portion in the (i*m+1)-th row to the (n−m+1)-th column (wherein i=1, 2, . . . , k0−2) leftward along the row; a step of calculating the parity bit of the (n−m+1)-th column by using a first inspection relationship as a start factor; and a step of simultaneously calculating parity bits of a plurality of groups by the recursive encoding method by using the inspection relationship moved leftward to the (n−m+1)-th column. | 09-30-2010 |
20100275090 | RADIO COMMUNICATION APPARATUS AND PUNCTURING METHOD - A radio communication apparatus is provided that enables degradation of error rate performance due to puncturing to be minimized when an LDPC code is used as an error correcting code. In this apparatus, a padding bit insertion section | 10-28-2010 |
20110289375 | METHOD FOR CONSTRUCTING AN LDPC CODE, TRANSMITTER, AND RECEIVER - Disclosed are: a method for constructing a low-density parity-check (LDPC) code for use in next-generation mobile communication and deep-space communication by using a cyclic distribution; a transmitter; a receiver; and a system. The method includes a block cycle determination step in which the distribution of a block cycle constructed from non-zero cyclic shift element values is determined for the basic matrix of the LDPC code, a priority determination step in which the priorities of the non-zero cyclic shift element values included in each block cycle are determined on the basis of the determined block cycle distribution, and a calculation step in which the greatest common divisor is determined for the permutation elements of all magnitudes in the check matrix of the LDPC code, and the divisor is factored. According to this method, short cycles will not be included in any actual check matrix of an LDPC code constructed by using all different permutation elements. | 11-24-2011 |
20140209809 | RADIATION DETECTORS - The present disclosure provides a radiation detector, comprising: a semiconductor crystal for detecting radiation, the semiconductor crystal comprising a top surface, a bottom surface, and at least one side surface; at least one anode arranged on at least one of the top surface, the bottom surface, and the at least one side surface; and at least one cathode arranged on at least another one of the top surface, the bottom surface, and the at least one side surface, wherein the at least one anode each has a stripe shape, the at least one cathode each has a planar or curved shape, and the at least one cathode and the at least one anode extend in parallel with respect to each other to a length substantially equal to that of the anode. Such an electrode structure can improve energy resolution and detection efficiency of the radiation detector effectively. | 07-31-2014 |
20140319635 | SEMICONDUCTOR DETECTOR - The invention provides a semiconductor detector, and the semiconductor detector comprises a semiconductor crystal, a cathode, an anode and at least one ladder electrode; the semiconductor crystal comprises a top surface, a bottom surface and at least one side; the cathode, the anode and the ladder electrode are conductive thin films deposited on a surface of the semiconductor crystal; the cathode is disposed on the bottom surface of the semiconductor crystal, the anode is disposed on the top surface of the semiconductor crystal, the ladder electrode is disposed on the at least one side of the semiconductor crystal; and the ladder electrode comprises a plurality of sub-electrodes. As compared to the prior art, the semiconductor detector can improve the energy resolution. | 10-30-2014 |
Patent application number | Description | Published |
20120084469 | USB TRANSACTION TRANSLATOR AND A BULK TRANSACTION METHOD - The present invention is directed to a universal serial bus (USB) transaction translator and an associated IN/OUT bulk transaction method. A device interface is coupled to a device via a device bus, and a host interface is coupled to a host via a host bus, wherein the host USB version is higher than the device USB version. At least two buffers configured to store data are disposed between the device interface and the host interface. A controller stores the data in the buffers alternately. In a bulk-IN transaction, before the host sends an IN packet, the controller pre-fetches data and stores the data in the buffers until all the buffers are full or a requested data length has been achieved; the pre-fetched data are then sent to the host after the host sends the IN packet. In a bulk-OUT transaction, the controller stores the data sent from the host in the buffers, and the data are then post-written to the device. | 04-05-2012 |
20120084471 | USB TRANSACTION TRANSLATOR AND A MICRO-FRAME SYNCHRONIZATION METHOD - The present invention is directed to a universal serial bus (USB) transaction translator and a micro-frame synchronization method. A device interface is coupled to a device via a device bus, and a host interface is coupled to a host via a host bus, wherein the host USB version is higher than the device USB version. At least two buffers configured to store data are disposed between the device interface and the host interface. A controller stores the data in the buffers alternately. A start-of-frame (SOF) counter is used to count the SOF packets, wherein the counting value of the SOF counter is compared to a predefined value. Specifically, the controller resets a SOF timer for sending the SOF packet when the counting value achieves the predefined value or is greater than the predefined value, such that the SOF packet and an isochronous timestamp packet (ITP) from the host are sent at the same time. Further, the controller delays the sending of the SOF packet for a period of time according to the ITP from the host. | 04-05-2012 |
20120084485 | USB TRANSACTION TRANSLATOR AND AN ISOCHRONOUS-IN TRANSACTION METHOD - The present invention is directed to a universal serial bus (USB) transaction translator and an associated IN isochronous transaction method. A device interface is coupled to a device via a device bus, and a host interface is coupled to a host via a host bus, wherein the host USB version is higher than the device USB version. At least two buffers configured to store data are disposed between the device interface and the host interface. A controller stores the data in the buffers alternately. A register is used to record device bus information. Before the host sends an IN packet, the controller pre-fetches data from the device according to the device bus information and then stores the data in the buffers; the controller responds with the pre-fetched data to the host after the host sends the IN packet. | 04-05-2012 |
20120144086 | USB TRANSACTION TRANSLATOR AND A METHOD THEREOF - The present invention is directed to a universal serial bus (USB) transaction translator and a micro-frame synchronization method. A device interface is coupled to a device via a device bus, and a host interface is coupled to a host via a host bus, wherein the host USB version is higher than the device USB version. At least two buffers configured to store data are disposed between the device interface and the host interface. A controller stores the data in the buffers alternately. A start-of-frame (SOF) counter is used to count the SOF packets, wherein the counting value of the SOF counter is compared to a predefined value. Specifically, the controller resets a SOF timer for sending the SOF packet when the counting value achieves the predefined value or is greater than the predefined value, such that the SOF packet and an isochronous timestamp packet (ITP) from the host are sent at the same time. Further, the controller delays the sending of the SOF packet for a period of time according to the ITP from the host. In another embodiment, the sending period of SOF packets may be dynamically adjusted in isochronous transfer. | 06-07-2012 |
20130227640 | METHOD AND APPARATUS FOR WEBSITE SCANNING - Described is a website scanning apparatus comprising a policy analysis device for determining whether a link in a target website belongs to a known web application used by the target website. If the link belongs to the identified web application, then a vulnerability scanning is not performed on the link; a crawler device for obtaining the link content that the link points to; a web application identification device for determining whether the link belongs to a known web application; a full scan device for performing a full vulnerability scanning on a link determined as not belonging to the known web application; and a known web application vulnerability detection device for performing vulnerability detection for the identified web application according to known vulnerabilities to determine whether the known vulnerabilities exist in the website. A website scanning method employed by the website scanning apparatus is also described. | 08-29-2013 |
20130276126 | WEBSITE SCANNING DEVICE AND METHOD - The invention discloses a website scanning apparatus for performing a security vulnerability scanning on a target website, which apparatus comprises: a web page obtaining component obtaining current content and/or features of a web page corresponding to a link to be processed; a link processing component including a change judgment device for judging whether the web page corresponding to the link to be processed has been changed based on stored web page content and/or features corresponding to the link to be processed as well as the current web page content and/or features of the link to be processed; and a vulnerability detecting component for performing a security vulnerability detection on a web page corresponding to a link to be processed for which the web page has been changed. The invention also discloses a website scanning method corresponding thereto. | 10-17-2013 |
20140059267 | USB TRANSACTION TRANSLATOR AND USB TRANSACTION TRANSLATION METHOD - A universal serial bus (USB) transaction translator is provided along with a micro-frame synchronization method. A device interface is coupled to a device via a device bus, and a host interface is coupled to a host via a host bus. At least two buffers are configured to store data. A controller stores the data in the buffers alternately. A start-of-frame (SOF) counter is used to count the SOF packets, with the counting value of the SOF counter being compared to a predefined value. Specifically, the controller resets a SOF timer for sending the SOF packet when the counting value achieves or exceeds the predefined value, such that the SOF packet and an isochronous timestamp packet (ITP) from the host are sent at the same time. Further, the controller delays the sending of the SOF packet for a period of time according to the ITP from the host. | 02-27-2014 |
Patent application number | Description | Published |
20090132530 | WEB CONTENT MINING OF PAIR-BASED DATA - Described herein is technology for, among other things, mining pair-based data on the web. The technology involves an online pair-based data mining system as well as an offline SVM training system. By subjecting a pair-based input data to the systems, one may grow a pool of pair-based data which share characteristics of the pair-based input data in more efficient manner. | 05-21-2009 |
20100114574 | RETRIEVAL USING A GENERALIZED SENTENCE COLLOCATION - A method and system for identifying documents relevant to a query that specifies a part of speech is provided. A retrieval system receives from a user an input query that includes a word and a part of speech. Upon receiving an input query that includes a word and a part of speech, the retrieval system identifies documents with a sentence that includes that word collocated with a word that is used as that part of speech. The retrieval system displays to the user an indication of the identified documents. | 05-06-2010 |
20100241416 | ADAPTIVE PATTERN LEARNING FOR BILINGUAL DATA MINING - Embodiments for the adaptive learning of translation layout patterns to mine bilingual data are disclosed. In accordance with at least one embodiment, the adaptive learning of patterns to mine bilingual data includes processing a bilingual web page into a Document Object Model (DOM) tree. The embodiment further includes linking the bilingual snippet pairs of each node into a plurality bilingual snippet pairs. The embodiment also includes determining one or more best fit candidate patterns based on the plurality of translation snippets via a Support Vector Machine classifier. The embodiment additionally includes mining one or more translation pairs from the bilingual web page using the one or more best fit candidate patterns. The translation pairs are further stored in a data storage. The one or more translation pairs including at least one of a term pair, a phrase pair, or a sentence pair. | 09-23-2010 |
20110213763 | WEB CONTENT MINING OF PAIR-BASED DATA - Described herein is technology for, among other things, mining pair-based data on the web. The technology involves an online pair-based data mining system as well as an offline SVM training system. By subjecting a pair-based input data to the systems, one may grow a pool of pair-based data which share characteristics of the pair-based input data in more efficient manner. | 09-01-2011 |
20110257959 | GENERATING CHINESE LANGUAGE BANNERS - Embodiments are disclosed for automatically generating a banner given a first scroll sentence and a second scroll sentence of a Chinese couplet. The first and/or second scroll sentence can be generated by an automatic computer system or by a human (e.g., manually generated and then provided as input to an automated banner generation system) or obtained from any source (e.g., a book) and provided as input. In one embodiment, an information retrieval process is utilized to identify banner candidates that best match the first and second scroll sentences. In one embodiment, candidate banners are automatically generated. In one embodiment, a ranking model is applied in order to rank banner candidates derived from the banner search and generation processes. One or more banners are then selected from the ranked banner candidates. | 10-20-2011 |
20130144600 | ADAPTIVE PATTERN LEARNING FOR BILINGUAL DATA MINING - Embodiments for the adaptive learning of translation layout patterns to mine bilingual data are disclosed. In accordance with at least one embodiment, the adaptive learning of patterns to mine bilingual data includes processing a bilingual web page into a plurality bilingual snippet pairs. The embodiment also includes determining one or more best fit candidate patterns based on the plurality of translation snippets. The embodiment additionally includes mining one or more translation pairs from the bilingual web page using the one or more best fit candidate patterns. The translation pairs are further stored in a data storage. The one or more translation pairs including at least one of a term pair, a phrase pair, or a sentence pair. | 06-06-2013 |
20130223727 | METHOD AND DEVICE FOR LEARNING OF A CLASSIFIER, AND PROCESSING APPARATUS - Unlabeled samples are added to existing samples. Candidate samples for new support vectors are extracted from the added unlabeled samples using a plurality of existing support vectors. The new support vectors are selected from the candidate samples using the plurality of existing support vectors. | 08-29-2013 |
Patent application number | Description | Published |
20110158336 | PEAK-TO-AVERAGE POWER RATIO (PAR) REDUCTION BASED ON ACTIVE-SET TONE RESERVATION - In an embodiment, a transmitter includes first and second processing blocks, which may each include hardware, software, or a combination of hardware and software. The first processing block is operable to generate a first peak-reducing vector. And the a second first processing block is operable to receive a first data vector, the data vector comprising a plurality of samples, the first data vector having a first peak with a first index and a first magnitude, a second peak with a second index and a second magnitude that is less than the first magnitude, and a first peak-to-average power ratio, and to generate a second data vector having a second peak-to-average power ratio that is lower than the first peak-to-average power ratio by using the first peak-reducing vector. | 06-30-2011 |
20110159831 | CHANNEL ESTIMATION FOR COMMUNICATION SYSTEMS WITH MULTIPLE TRANSMIT ANTENNAS - According to an embodiment, a receiver, system and method for channel estimation in a communications system utilizing multiple transmit antennas are provided. The receiver comprises an antenna node operable to receive a signal that includes a superposition of at least a first signal corresponding to a first sequence and a second signal corresponding to a second sequence; and a channel estimator, coupled to the antenna node, operable to correlate the received signal with at least one of the first and second sequences, to determine at least one boundary between at least two waveforms resulting from the correlation, and to calculate using the boundary and the at least two waveforms a first channel response corresponding to the first signal and a second channel response corresponding the second signal. Channel estimates are determined based on determined boundaries and may be smoothed by a Savitzky-Golay filter in the frequency domain. The variance of additive white Gaussian noise (AWGN) may also be estimated. | 06-30-2011 |
20130343482 | PEAK-TO-AVERAGE POWER RATIO (PAR) REDUCTION BASED ON ACTIVE-SET TONE RESERVATION - In an embodiment, a transmitter includes first and second processing blocks, which may each include hardware, software, or a combination of hardware and software. The first processing block is operable to generate a first peak-reducing vector. And the a second first processing block is operable to receive a first data vector, the data vector comprising a plurality of samples, the first data vector having a first peak with a first index and a first magnitude, a second peak with a second index and a second magnitude that is less than the first magnitude, and a first peak-to-average power ratio, and to generate a second data vector having a second peak-to-average power ratio that is lower than the first peak-to-average power ratio by using the first peak-reducing vector. | 12-26-2013 |
Patent application number | Description | Published |
20110222543 | METHOD FOR FORWARDING DATA PACKET, SYSTEM, AND DEVICE - A method for forwarding data packet, a communication system, a Carrier Grade Network Address Translation (CGN) device, and an access gateway are provided. The CGN device communicates with the access gateway through an Internet Protocol Version 4 (IPv4) network and is used for receiving a first data packet forwarded by the access gateway and determining whether the first data packet is an IPv4 packet or an IPv6-over-IPv4 tunnel packet; forwarding the first data packet to the IPv4 network if the first data packet is the IPv4 packet; and decapsulating the first data packet if the first data packet is the IPv6-over-IPv4 tunnel packet to a first IPv6 packet, and sending the first IPv6 packet to an IPv6 network or the IPv4 network. Therefore, technical problems of fully utilizing the IPv4 network and, gradually increasing deployment of the IPv6 network, and realizing communication are solved. | 09-15-2011 |
20120084462 | METHOD FOR OBTAINING IP ADDRESS OF DHCPV6 SERVER, DHCPV6 SERVER, AND DHCPV6 COMMUNICATION SYSTEM - The present invention relates to the field of communications, and in particular, relates to a method for obtaining an Internet Protocol (IP) address of a Dynamic Host Configuration Protocol version 6 (DHCPv6) server, a DHCPv6 server, and a DHCPv6 communication system. The method is applied in a scenario of communication through a DHCPv6 relay agent, and includes: receiving, by a DHCPv6 server, a message of a DHCPv6 client forwarded by a DHCPv6 relay agent; sending, by the DHCPv6 server, a response message to the DHCPv6 client through the DHCPv6 relay agent, in which a payload of the response message carries an IP address of the DHCPv6 server, so that the DHCPv6 client obtains the IP address of the DHCPv6 server from the response message. | 04-05-2012 |
20120144483 | METHOD AND APPARATUS FOR PREVENTING NETWORK ATTACK - The present disclosure relates to the communication field, and discloses a method for preventing a network attack. The method includes: receiving a packet; when the received packet is a first packet, determining whether a source IP address and a source MAC address information that are carried in the first packet exist in a first record table; if so, obtaining a second packet, the source addresses of which are the same as the source as addresses of the first packet, and sending the second packet to a CPU for processing. Through this method, a network attack can be prevented effectively, and a packet can be sent to the CPU for processing in the case that the validity of the packet is determined. Therefore, some application that requires sending packets to the CPU for processing is supported. The present disclosure further discloses an apparatus for preventing a network attack. | 06-07-2012 |
20120201250 | METHOD, APPARATUS AND SYSTEM FOR IMPLEMENTING MULTI-PARTY COMMUNICATION - Embodiments of the present invention relate to the field of communication technologies and disclose a method, an apparatus, and a system for implementing multi-party communication to extend application of a traversal technology in the multi-party communication. A method for implementing multi-party communication includes: sending a communication request to a first node through a forwarding node on a network layer; and receiving the communication connection request sent by the first node, and setting up a communication connection with the first node. The method, apparatus, and system provided in the embodiments of the present invention are applicable to multi-party communication that requires traversal. | 08-09-2012 |
20120297086 | METHOD FOR IMPLEMENTING COMMUNICATION BETWEEN DIFFERENT NETWORKS AND APPARATUS - Embodiments of the present invention disclose a method for implementing communication between different networks, where the method includes: receiving a multicast data obtaining request supporting a first network protocol, and determining multicast data identity information (MDID) of multicast data that needs to be obtained; obtaining, according to the MDID, in a multicast manner and from a network device supporting a second network protocol, the multicast data that needs to be obtained, and buffering the multicast data that needs to be obtained; establishing, for the multicast data that needs to be obtained, a multicast group supporting the first network protocol; and sending the multicast data that needs to be obtained by a user apparatus to the user apparatus which joins the multicast group supporting the first network protocol. | 11-22-2012 |
20130311624 | METHOD, APPARATUS AND SYSTEM FOR CONFIGURING IP ADDRESS - The present invention discloses a method, an apparatus and a system for configuring an IP address to solve a problem that in the process of network renumbering, when a conflict occurs between address configuration policies of a host, adopting a local policy of the host may cause an adverse impact on a network. In the present invention, when an address configuration policy conflict occurs, a terminal reports address configuration policy conflict information to a network side, so that the address configuration policy conflict in the terminal is no longer processed by a local policy of the terminal, but processed by the network side, that is, the network side decides what address configuration policy is adopted for the terminal. Therefore, an optimal solution can be provided for the conflict according to the actual situation of the network, thereby preventing an adverse impact on the network caused by the conflict. | 11-21-2013 |
20140032782 | METHOD AND APPARATUS FOR ROUTE SELECTION OF HOST IN MULTIHOMING SITE - Embodiments of the present invention provide a method and an apparatus for route selection of a host in a multihoming site. The method includes: receiving transition technology information sent by a client premises equipment CPE; associating the transition technology information with an Internet Protocol IP address of the CPE and recording association information in an entry; and performing route selection according to the association information in the entry. In the embodiments, the transition technology information is associated with the IP address of the CPE, that is, the CPE corresponds to a corresponding transition technology, so that a host is capable of clearly learning a transition technology used by a home network of the CPE. Therefore, a proper CPE can be selected during routing, and selecting a best route can be ensured. | 01-30-2014 |
20140095733 | METHOD AND DEVICE FOR CONTROLLING ADDRESS CONFIGURATION MODE - The present invention discloses a method and a device for controlling an address configuration mode, and belongs to the field of communications. The method includes: specifying, by a network side device, an address configuration mode for a terminal; and sending, by the network side device, a message to the terminal to instruct the terminal to perform address configuration according to the address configuration mode specified by the network side device, where the address configuration mode is a Dynamic Host Configuration Protocol DHCP mode or a stateless address autoconfiguration SLAAC mode. The device includes a setting module and a notifying module. By using the present invention, the network side controls an IP address configuration mode of the terminal. | 04-03-2014 |
Patent application number | Description | Published |
20120108629 | New use of neferine - The present invention reveals a new use of neferine. Neferine regulates M8 and V1 subtype of transient receptor potential ion channel (TRPM8 and TRPV1), respectively, in mammalians, including humans, and can be used for preparing medicaments for treating disease related to said ion channel (such as hyperalgesia, Parkinson's disease, painful bladder syndrome, chronic obstructive pulmonary disease, and tumor of skin, prostate, mammary gland, lung, colon, etc). The potency of neferine in the present invention is higher than that of hexahydrothymol. | 05-03-2012 |
20130116276 | New use of neferine - The present invention reveals a new use of neferine. Neferine regulates M8 and V1 subtype of transient receptor potential ion channel (TRPM8 and TRPV1), respectively, in mammalians, including humans, and can be used for preparing medicaments for treating disease related to said ion channel (such as hyperalgesia, Parkinson's disease, painful bladder syndrome, chronic obstructive pulmonary disease, and tumor of skin, prostate, mammary gland, lung, colon, etc). The potency of neferine in the present invention is higher than that of hexahydrothymol. | 05-09-2013 |
Patent application number | Description | Published |
20110265181 | METHOD, SYSTEM AND GATEWAY FOR PROTECTION AGAINST NETWORK ATTACKS - A method, a system and a gateway for protection against network attacks are provided. The method includes: receiving source request information and destination request information that are sent by a client, where the destination request information is notified by a Domain Name System (DNS) to the client sending the source request information; checking the source request information and the destination request information; and discarding the source request information and the destination request information when the checking result is undesirable. Through the technical solution, the DNS selects the destination request information according to the source request information sent by the client, and establishes a corresponding relation between the client and a server according to a matching relation between the source request information and the destination request information, so as to prevent DDOS attacks. | 10-27-2011 |
20120204264 | METHOD, APPARATUS AND SYSTEM FOR DETECTING BOTNET - A method, an apparatus, and a system for detecting Botnet are disclosed. The method for detecting Botnet includes: obtaining an address information about a control host in a Bot sample by using an auto breakout environment; sending a query request message to a traffic analysis device to obtain an address information of a Bot host connected with the control host, in which the query request message carries the address information about the control host; and receiving a query response message returned by the traffic analysis device, in which the query response message carries the address information of the Bot host connected with the control host. The method for detecting Botnet can obtain the Botnet information in real time and construct a topology of the Botnet. | 08-09-2012 |
20120233691 | METHOD, DEVICE AND SYSTEM FOR ALERTING AGAINST UNKNOWN MALICIOUS CODES - A method, a device, and a system for alerting against unknown malicious codes are disclosed. The method includes: detecting characteristics of a packet; judging whether any suspicious code exists in the packet according to a result of the detection; recording a source address of the suspicious code if the suspicious code exists in the packet; and sending alert information that carries the source address to a monitoring device. The embodiments of the present invention can report source addresses of numerous suspicious codes proactively at the earliest possible time, lay a foundation for shortening the time required for overcoming virus threats, and avoid the trouble of installing software on the client. | 09-13-2012 |
20120254977 | METHOD, DEVICE, AND SYSTEM FOR NETWORK ATTACK PROTECTION - The present invention discloses a method for network attack protection, a device, and a system thereof. The method includes: receiving information about attack source, in which the information about the attack source carries address information about an attacker; obtaining address information about a gateway corresponding to the attacker according to the address information about the attacker and a preset mapping relationship between the attacker and the gateway corresponding to the attacker; and sending a first control message to the gateway corresponding to the attacker according to the address information about the gateway corresponding to the attacker, wherein the first control message instructs the gateway corresponding to the attacker to control traffic of the attacker. The present invention may be used on a communications network to prevent the attacker from attacking victim hosts on the network from the root, avoid blockage on the upstream network of the victim hosts. | 10-04-2012 |
20130081136 | METHOD AND DEVICE FOR DETECTING FLOOD ATTACKS - Disclosed is a flood attack detection method, wherein the total number of keywords of a source packet is acquired, and the number of feature parameters corresponding to the source packet is acquired. A ratio of the number of feature parameters to the total number of keywords is compared with a preset threshold, and if the ratio is greater than or equal to the preset threshold, it is determined that a flood attack occurs. | 03-28-2013 |
20130133068 | METHOD, APPARATUS AND SYSTEM FOR PREVENTING DDOS ATTACKS IN CLOUD SYSTEM - A method, an apparatus and a system for preventing DDoS (Distributed Denial of Service) attacks in a cloud system. The method for preventing DDoS attacks in a cloud system includes: monitoring, by a protection node in a cloud system, data traffic input into virtual machines, where the cloud system includes the protection node and multiple virtual machines, and data streams communicated between the virtual machines pass through the protection node; extracting data streams to be input into virtual machines if it is detected that the data traffic input into the virtual machines is abnormal; sending the extracted data streams to a traffic cleaning apparatus for cleaning; receiving the data streams cleaned by the traffic cleaning apparatus; and inputting the cleaned data streams into the virtual machines. The technical solutions provided in the embodiments of the present disclosure can effectively prevent DDoS attacks between virtual machines in the cloud system. | 05-23-2013 |
20130219467 | NETWORK AUTHENTICATION METHOD, METHOD FOR CLIENT TO REQUEST AUTHENTICATION, CLIENT, AND DEVICE - A network authentication method, a client and a device are provided. The method includes: receiving SYN data sent by a client, where the SYN data includes a sequence number SEQ1 and a network parameter comprising an ID in the header of the SYN data; sending SYN_ACK data to the client, where the SYN_ACK data includes an acknowledgment number ACK2 obtained by carrying out a function transformation according to the network parameter; receiving RST data sent by the client, where the RST data includes a sequence number SEQ3 or an acknowledgment number ACK3, and the RST data further includes a network parameter the same as that of the SYN data; carrying out the function transformation according to the network parameter of the RST data to obtain a check value CHK; and passing the authentication of the client if CHK matches SEQ3 or ACK3. | 08-22-2013 |
20140189879 | METHOD FOR IDENTIFYING FILE TYPE AND APPARATUS FOR IDENTIFYING FILE TYPE - A method for identifying a file type and an apparatus for identifying a file type, so as to solve a problem in the prior art that a file type cannot be effectively identified when a sender tampers with a file being transmitted. The method includes: acquiring, from a transmitted data packet, a file header of a file to be identified, and determining whether a magic number can be obtained from the file header; if the magic number can be obtained, searching for the file type that corresponds to the magic number; determining whether data of the file to be identified complies with a data structure feature of the file type; if yes, determining that a file type of the file to be identified is the file type that corresponds to the magic number; and if not, determining that a file type of the file is an abnormal type. | 07-03-2014 |
20140289856 | Method and Device for Optimizing and Configuring Detection Rule - A method and a device for optimizing and configuring a detection rule, where the method includes: a network entity receives network traffic; extracts a packet from the network traffic, and identifies, according to a feature of the packet, protocol related information used in the network; saves the protocol related information and correspondence between pieces of information in the protocol related information to a first learning association table; and matches a corresponding rule from a vulnerability rule base according to the protocol related information to generate a first compact rule set. Through the generated compact rule set in the present invention, subsequent protocol detection is performed only for a protocol threat that may occur in a live network; therefore, content that needs to be detected subsequently is reduced, the detection efficiency is improved, and unnecessary performance consumption is avoided at the same time. | 09-25-2014 |
20140298445 | Method and Apparatus for Filtering URL - A method and an apparatus for filtering a uniform resource locator (URL). According to the method, a first category corresponding to a URL connection request can be found in a pre-stored category information table; when the first category conforms to a predetermined URL passing through policy, the URL connection request is allowed to pass through; the URL connection request is forwarded to a corresponding server; a second category corresponding to a URL is determined according to web page content returned by the server; if the second category conforms to the predetermined URL passing through policy, the web page content is sent to a client; if the second category does not conform to the predetermined URL passing through policy, the web page content is blocked. A category to which a URL belongs can be determined in real time, and implementing a function of accurate category filtration. | 10-02-2014 |
20140298466 | Data Detecting Method and Apparatus for Firewall - A data detecting method and apparatus for a firewall device connected with a network to identify security threat in the data, where the method is implemented by a fast forwarder in the firewall device and includes: the fast forwarder receives application data; obtains application information in the received application data; determines an application protocol type corresponding to the application data according to the application information and an application identifying table; queries a configuration item for threat detection according to the application protocol type to determine whether the application data requires threat detection; and if the application data does not require threat detection, forwarding the application data. The data detecting method avoids a problem that performance of a firewall is degraded because all application data is sent to a detecting processor in the firewall device for detection, thereby improving an performance of the firewall device. | 10-02-2014 |
20140310322 | Method and System for Identifying File Type - A method and a system for identifying a file type. A modification interface may be provided so that a user inputs a file feature parameter, and the file feature parameter input by the user is added to a file type configuration file, then the file type configuration file is loaded to a state machine to perform file type identification. Therefore, the user can modify a file feature parameter in the original file type configuration file, and when a file feature parameter of a file of a certain type is changed or a file of a new type appears, the user can update a file feature parameter in the state machine in time to identify the changed file or the file of the new type. In this way, the user does not need to search for an identification tool on the Internet. | 10-16-2014 |
20140317718 | IPS Detection Processing Method, Network Security Device, and System - An IPS detection processing method, a network security device and a system are disclosed. The method includes: determining, by a network security device, whether an internal network device is a client or a server; if the internal network device is the client, simplifying an IPS signature rule base to obtain an IPS signature rule base corresponding to the client, or if the internal network device is the server, simplifying the IPS signature rule base to obtain an IPS signature rule base corresponding to the server; generating a state machine according to a signature rule in the IPS signature rule base obtained through simplifying processing; and performing IPS detection on flowing-through traffic by applying the state machine. In embodiments of the present invention, the network security device performs IPS detection by adopting the state machine with a redundant state removed, thereby improving IPS detection efficiency. | 10-23-2014 |
20140331306 | Anti-Virus Method and Apparatus and Firewall Device - An anti-virus method which includes receiving, by a first thread, data packets belonging to the same data stream, and sequentially buffering payload data of data packets bearing file content among the received data packets into a first queue, reading, by a second thread, payload data of at least one data packet from a start position of the first queue, and determining whether payload data in the first queue is file content of a compressed file. If yes, identifying a compressed format of the compressed file, querying a decompression algorithm from a mapping between a compressed format and a decompression algorithm, by using the queried decompression algorithm, reading payload data of data packets one by one from the first queue, and performing decompression processing separately on payload data that is read each time, and performing anti-virus detection separately on file content that is obtained. | 11-06-2014 |
20150033343 | Method, Apparatus, and Device for Detecting E-Mail Attack - A method, an apparatus, and a device for detecting an E-mail attack. The device receives a data flow; obtains an E-mail traffic parameter of each statistic period within a predetermined number of statistic periods, where within each statistic period, the E-mail traffic parameter of each of the statistic periods is determined according to a protocol type of the received data flow; and determines that an E-mail attack is detected when the E-mail traffic parameter of each statistic period within the predetermined number of statistic periods matches a first threshold. By applying the disclosed embodiments, a detection result of the E-mail attack is more accurate. | 01-29-2015 |
Patent application number | Description | Published |
20100049843 | METHOD, SYSTEM AND DEVICE FOR DELETING BEARER OF INTERNET PROTOCOL CONNECTION IN COMMUNICATION SYSTEM - A method for deleting bearers of an IP connection in a communication system includes: deleting bearers of a first IP connection and the corresponding connection channels of the bearers; determining whether an IP address of a UE is associated with a bearer among bearers of a second IP connection; and preserving the IP address of the UE if the IP address of the UE is determined to be associated with the bearer among bearers of the second IP connection. Additionally, a system and a device for deleting bearers of an IP connection in the communication system are provided. | 02-25-2010 |
20100177736 | METHOD AND DEVICE FOR INDICATING DATA RE-TRANSMISSION WHEN AREA SWITCHING IN LTE SYSTEM - A method and device for indicating data re-transmission when area switching in LTE system, wherein the method comprises the following steps: S_eNB sends PDCP-SDU CN report to T_eNB in order to announce PDCP-SDU SN received, and T_eNB announces PDCP-SDU SN received by S_eNB to UE. Thereby, UE would not re-transmit PDCP-SDU corresponding to received SN, which avoids re-transmission of useless PDCP-SDU, and saves radio resources comparing with prior solutions. | 07-15-2010 |
20110098048 | Method, System and Device for Reporting User Location Information - A method for reporting location information of user is disclosed in the present invention, which is configured for achieving the report of a location information of User Equipment (UE) during the procedure that UE is handed over to another serving cell, and includes the following steps: a source evolved Node Base (eNB) initiates a handover procedure; during the handover procedure, the source eNB sends the location reporting information to a target eNB, the target eNB acquires the location information of UE based on the location reporting information and reports it to a Mobility Management Entity (MME) corresponding to the target eNB. According to the present invention, it is possible for the source eNB to notify the target eNB based on a handover request of UE that the target eNB should report the location information after the UE is handed over to another serving cell, so that the target eNB can report the location information of UE to MME during the handover procedure of the serving cells. The present invention simplifies the signalling flow and is simple to be implemented. | 04-28-2011 |
20110116478 | METHOD AND MOBILE MANAGEMENT ENTITY FOR OBTAINING BEARER CONDITION DURING HANDOVER OF USER EQUIPMENT - The present invention provides a method for obtaining bearer condition during a handover of UE. The method includes: receiving, by a mobile management entity (MME), information of at least one bearer allowed to be accepted by a target base station (eNB) when the eNB makes an admission control for a UE based on received bearer information of the UE during handover of the UE; updating, by the MME, a UE-AMBR used by the target eNB based on the received at least one bearer. The present invention also provides an MME which enables the target side obtain actual bearer condition during handover of a UE. | 05-19-2011 |
20110210845 | ALLOCATING METHOD OF MOVING AREA LIST OF USER EQUIPMENT AND CORRESPONDING APPARATUS - A method of allocating the moving area list of user equipment which relating to wireless communication technology. Interacting signaling between network and UE is reduced. The utilization efficiency of network resource is enhanced. The method includes, receiving the area ID which is pre-defined from UE, acquiring the history information of the last allocated moving area list from the mobility management entity (MME) which allocated the last moving area list, allocating new moving area list according to the history information and the received area ID. Accordingly, a MME and UE are disclosed. | 09-01-2011 |
20140301367 | METHOD AND DEVICE FOR PROCESSING DATA DURING CELL HANDOVER IN LTE SYSTEM - A method and UE for processing data during cell handover in a Long Term Evolution (LTE) system are provided. The method includes: receiving, by User Equipment (UE), a Sequence Number (SN) of a Packet Data Convergence Protocol-Service Data Unit | 10-09-2014 |
Patent application number | Description | Published |
20110099637 | SECURITY DISPOSING METHOD AND DEVICE FOR INPUT DATA - A security disposing method and device for the input data involves generating an interference data according to a predefined rule when inputting the data, and mixing the input data with the interference data and sending the mixed data, and parsing out the interference data according to the predefined rule after receiving the mixed data, and separating the input data according to the parsed interference data. | 04-28-2011 |
20140050277 | METHOD AND APPARATUS FOR SELECTING MULTI-USER PAIRING IN A MULTI-USER MULTI-INPUT MULTI-OUTPUT SYSTEM - The method includes calculating by user equipment an SINR of each of precoding vectors in a precoding matrix; whether there is an SINR greater than a first threshold in the SINRs of the precoding vectors; selecting by the user equipment a precoding vector to which the SINR greater than the first predetermined threshold corresponds according to a predefined policy; and feeding back by the user equipment to a base station a PMI of the selected precoding vector and a quantified value of the corresponding SINR, or feeding back by the user equipment to a base station a PMI of the selected precoding vector, a quantified value of the corresponding SINR and a number of times of transformation to which the SINR corresponds, or feeding back by the user equipment to a base station only a number of times of transformation. | 02-20-2014 |
20140064236 | CHANNEL RECONFIGURATION METHOD, PRECODING METHOD AND APPARATUS THEREFOR - In order to recognize a relatively accurate channel state of each UE, a channel of the UE is reconfigured based on channel phase information and channel quality information reported from the UE to obtain a channel matrix of the UE. Besides, a channel of the UE is reconfigured based on channel phase information and channel quality information reported from the UE to obtain a channel matrix of the UE, a precoding matrix of the UE is determined based on the channel matrix of the UE, and precoding is performed on data to transmit to the UE, using the precoding matrix. | 03-06-2014 |
20140133419 | METHOD FOR COORDINATING INTER-CELL INTERFERENCE IN RADIO NETWORK, BASE STATION AND RADIO NETWORK - Provided are a method for coordinating inter-cell interference in a radio network, a transmission point and the radio network. The method includes: a step A of a normal base station performing scheduling based on feedback information of users of the normal base station and obtain a user scheduling result of the normal base station including a parameter about actual transmission characteristics of the normal base station; a step B of the normal base station obtaining a performance estimating parameter including a parameter about actual transmission characteristics of each of the one or plurality of low-power base stations for both cases of normal base station without transmission and normal base station with transmission; a step C of the normal base station using the performance estimating parameter and the user scheduling result of the normal base station as a basis to determine weighting throughputs of all transmission points for the case of normal base station without transmission and weighting throughputs of all the transmission points for the case of normal base station with transmission; and a step D of the normal base station comparing the weighting throughputs of all the transmission points, obtaining a transmission determination result and performing data transmission based on the transmission determination result. | 05-15-2014 |
20140169275 | METHOD FOR COORDINATING INTER-CELL INTERFERENCE IN HETEROGENEOUS NETWORK AND HETEROGENEOUS NETWORK - Provided are a method for coordinating inter-cell interference in a heterogeneous network (HetNet) and the heterogeneous network. The method includes: forming M normal base stations and low-power nodes within coverage of the respective normal base stations in the heterogeneous network into a coordinated group; combining mute/non-mute states of bandwidths of the M normal base stations to obtain a plurality of states of the coordinated group; a user of each of the normal base stations feeding at least one first CQI back to the normal base station; a user of each of the low-power nodes feeding one or more second CQIs back to the low-power node; using the first CQI and the second CQIs as a basis to make capacity estimation of the coordinated group; and setting the mute/non-mute states of the bandwidths of the M normal base stations in accordance with a state of the coordinated group corresponding to an optimal system capacity so as to perform data transmission. In the method for coordinating interference provided by the present invention, M transmission points each including one or more normal base stations and low-power nodes covered by the respective normal base stations can be formed into a coordinated group, thereby extending processing for the normal base stations up to all the transmission points in the coordinated group. | 06-19-2014 |
Patent application number | Description | Published |
20110055151 | Processing Database Operation Requests - A method and system for processing database operation requests, the method comprising: receiving a database operation request from a user; determining whether the database operation request is a heavy-duty request; if the database operation request is a heavy-duty request, routing the database operation request to a heavy-duty request database partition for processing heavy-duty requests to be processed, and recording the data scope affected by the database operation request into a metadata repository, wherein the heavy-duty request database partition is set besides an original normal database partition. | 03-03-2011 |
20110106789 | DATABASE SYSTEM AND METHOD OF OPTIMIZING CROSS DATABASE QUERY - A database system and a method of optimizing cross-database query. The database system includes a plurality of databases. At least two of the databases are stored with one or more data collections composed of tables with the same structure. A federated view of the data collection is created on each of the databases. A request routing layer for routing, in response to a query request crossing the data collections, the query request crossing the data collections to one of the at least two databases according to a predetermined routing rule, so as to query by using the federated view of the database. | 05-05-2011 |
20120136637 | ADJUSTING WHEEL DIAMETER - A method and apparatus for adjusting wheel diameter by acquiring a current wheel diameter distribution vector; calculating similarity scores between the current wheel diameter distribution vector and known wheel diameter distribution vector clusters to determine a potential wear rate of the current wheel diameter distribution vector; calculating similarity scores between candidate target wheel diameter distribution vectors and the known wheel diameter distribution vector clusters to determine a potential wear rates of the candidate target wheel diameter distribution vectors; and selecting a target wheel diameter distribution vector from the candidate target wheel diameter distribution vectors, such that the reduction of potential wear rate achieved by switching the current wheel diameter distribution vector to the target wheel diameter distribution vector meets a predetermined condition. Future potential wear rates and the amount of grinding required during train maintenance can be optimized through changing wheel diameter distribution vectors. | 05-31-2012 |
20120173300 | INFRASTRUCTURE ASSET MANAGEMENT - An approach for infrastructure asset management is provided. This approach comprises an end-to-end analytics driven maintenance approach that can take data about physical assets and additional external data, and apply advanced analytics to the data to generate business insight, foresight and planning information. Specifically, this approach uses a maintenance analysis tool, which is configured to: receive data about a set of physical assets of an infrastructure, and analyze the data about the set of physical assets to predict maintenance requirements for each of the set of physical assets. The maintenance analysis tool further comprises an output component configured to generate a maintenance plan based on the predicted maintenance requirements for each of the set of physical assets. | 07-05-2012 |
20120173301 | SYSTEM AND METHOD FOR FAILURE ASSOCIATION ANALYSIS - A system and method for mining the failure association rules of geographically dispersed physical assets is provided. One approach of the present invention has steps of joining input data sources, extracting spatio-temporal (ST) information, quantilizing ST continuous value in automated manner, or based on pre-built knowledge, applying association rule mining algorithm to find associations between attributes and failure and outputting identified ST failure association rules. | 07-05-2012 |
20130013640 | MINING GENERALIZED SPATIAL ASSOCATION RULE - A system, method and computer program product for mining a rule including spatial information and non-spatial information by using a SAR (Spatial Association Rule) mining tool. The computing system is configured to construct an expanded spatial predicate transaction table for reference spatial objects and a generalized taxonomy for task-relevant spatial objects. The computing system is configured to run the SAR mining tool with the constructed expanded spatial predicate transaction and the generalized taxonomy. The computing system outputs, from the SAR mining tool, a set of generalized spatial association rules for the reference spatial objects. The generalized spatial association rule includes the spatial information and non-spatial information, associated with both the reference spatial objects and the task-relevant spatial objects. | 01-10-2013 |
20130271289 | ANOMALY DETECTION USING USAGE DATA FOR METERING SYSTEM - A method, system and computer program product for detecting anomalies in a metering system. In one embodiment, data representing usage of a defined commodity are collected from meters, and the data collected over a given time period are analyzed to identify any of the meters showing at least one defined type of anomalous usage pattern. For each of the meters showing an anomalous usage patterns, an anomaly score is determined for the usage pattern shown, and the anomaly scores are used to rank the meters. In one embodiment, the collected data are analyzed to identify any of the meters showing one or more of a group of types of anomalous patterns including meter-no-reading, meter-by-pass, and meter-silting patterns. Embodiments of the invention utilize time series techniques and data analysis on meter reading data. Further, embodiments of the invention require no additional installation of equipment or sensors. | 10-17-2013 |
20140236650 | INFRASTRUCTURE ASSET MANAGEMENT - An approach for infrastructure asset management is provided. This approach comprises an end-to-end analytics driven maintenance approach that can take data about physical assets and additional external data, and apply advanced analytics to the data to generate business insight, foresight and planning information. Specifically, this approach uses a maintenance analysis tool, which is configured to: receive data about a set of physical assets of an infrastructure, and analyze the data about the set of physical assets to predict maintenance requirements for each of the set of physical assets. The maintenance analysis tool further comprises an output component configured to generate a maintenance plan based on the predicted maintenance requirements for each of the set of physical assets. | 08-21-2014 |