Patent application number | Description | Published |
20110089789 | MOTOR DRIVE DEVICE - A motor drive device comprises a motor, a gearbox mounted to the motor and a control module. The gearbox comprises a gearbox housing that has an opening facing the motor. The motor has a shaft that extends into the gearbox housing through the opening to drive a worm gear of the gearbox. The control module has a PCB mounted to the gearbox and most of the PCB is accommodated in the opening of the gearbox housing. The PCB extends in a plane substantially parallel to the shaft. | 04-21-2011 |
20130038155 | GEAR MOTOR ASSEMBLY AND BRUSH MOTOR THEREOF - A gear motor assembly includes a gearbox and a motor mounted to the gearbox. The gearbox includes a gear casing and a worm gear installed in the gear casing. The motor includes a stator, a rotor and brush gear. The rotor includes an shaft, a rotor core and a commutator fixed to the shaft. A worm integrally rotates with the shaft and is meshed with the worm gear. The brush gear includes multiple brushes slidably contacting the commutator, and multiple springs urging the corresponding brush towards the commutator. A lengthwise axis of the brush is inclined to a rotational axis of the commutator with a first angle between 75° to 87°. | 02-14-2013 |
20130038156 | Gear Motor Assembly - A gear motor assembly includes a gearbox, a motor mounted to the gearbox, a first damper and a second damper. The gearbox includes a gearing casing and a worm gear installed in the gear casing. The motor includes a stator and a rotor. The stator includes a housing. The rotor includes a motor shaft and a worm integrally rotating with the shaft. The shaft extends into the gear housing and the worm is meshed with the worm gear. The first damper is sandwiched between the gear casing and a first end of the shaft, eliminating end play between the shaft and the gear casing. The second damper is sandwiched between the motor housing and a second end of the shaft, eliminating end play between the shaft and the motor housing. | 02-14-2013 |
Patent application number | Description | Published |
20130127399 | CELL BALANCING SYSTEM AND METHOD - A system and method may identifying an overcharged cell from among a plurality of cells of a battery pack. An undercharged cell may be identified from among any of the plurality of cells of the battery pack. A switch may be operated to connect the overcharged cell to the undercharged cell via a direct current (DC)-DC converter. The DC-DC converter may be operated to transfer charge from the overcharged cell to the undercharged cell. | 05-23-2013 |
20130231826 | VEHICLE HEALTH PROGNOSIS - A method includes collecting state of health (SOH) data and usage data from a plurality of vehicles. A peer group is identified among the vehicles. A vehicle health prognosis is generated for each vehicle of the peer based on the collected SOH and usage data. The vehicles of the peer group are ranked based on the generated vehicle health prognosis and the rank is reported to an output device that is associated with each vehicle or with a user of each vehicle. If evaluation of the ranking indicates that the health prognosis of a vehicle of the peer group is improvable by modifying vehicle usage, an alert is issued to a user of that vehicle. | 09-05-2013 |
20130300190 | BATTERY STATE-OF-CHARGE OBSERVER - A robust battery state-of-charge observer determines a state-of-charge as function of an open circuit voltage by taking into account battery parameter uncertainties, which are due to battery age, variation, and operating conditions, (e.g. temperature and SOC level). Each of the time-varying battery parameter values are bounded. By utilizing the parameter variation bounds in the design process and constantly minimizing the estimation error covariance matrix, the robust observer achieves enhanced robustness to the variations of battery age, variation, and operating conditions such as temperature and SOC level. | 11-14-2013 |
20130300377 | BATTERY STATE-OF-CHARGE ESTIMATOR USING ROBUST H(INFINITY) OBSERVER - A battery state-of-charge (SOC) estimator uses a robust H | 11-14-2013 |
Patent application number | Description | Published |
20140049226 | SYSTEMS AND METHODS FOR BATTERY PARAMETER ESTIMATION - The present disclosure relates to estimation of battery parameters, including SOC and SOH using a plurality of particles, each of which represents at least one parameter and at least one state of a battery system. A system model may simulate the battery system using processing logic. Each of the plurality of particles may propagate through the system model to generate a plurality of modeled particle values, each of which may be compared to a measurement of an electrical parameter of the battery system. Each particle may be weighted based upon a comparison of the modeled particle value and the measurement. A successive plurality of particles may be generated based upon the weight assigned to each of the plurality of modeled particle values. A number of iterations may be performed to generate a tuned plurality of modeled particle values, upon which an estimated parameter of the battery system may be based. | 02-20-2014 |
20140191697 | STATOR WINDING DIAGNOSTIC SYSTEMS AND METHODS - Systems and methods are provided for diagnosing stator windings in an electric motor. An exemplary method for diagnosing stator windings in an electric motor involves determining an input energy imbalance across phases of the stator windings for an electrical period of the electric motor and identifying a fault condition when the input energy imbalance is greater than a first threshold value. In some embodiments, an input energy ratio across phases of the stator windings is also determined for the electrical period, wherein the fault condition is identified as a phase-to-phase short circuit fault condition when the input energy ratio is greater than a second threshold value and the input energy imbalance is greater than the first threshold value, or alternatively, as an in-phase short circuit fault condition when the input energy ratio is less than the second threshold value. | 07-10-2014 |
20140236501 | METHOD OF MONITORING PERFORMANCE OF AN ELECTRIC MOTOR - A method of monitoring performance of an electric motor includes calculating an actual input power and an expected input power of the electric motor. A power difference between the actual input power and the expected input power is recursively calculated over at least one period of an electrical cycle of the electric motor to determine a variance in the power difference during the at least one period of the electrical cycle. The variance in the power difference is compared to a threshold value to determine if the variance in the power difference is greater than the threshold value or less than the threshold value. The control module may signal that the electric motor is not operating within allowable operating parameters when the variance in the power difference is less than the threshold value. | 08-21-2014 |
Patent application number | Description | Published |
20110085630 | TCP FLOW CLOCK EXTRACTION - A packet trace is received. The packet trace is transformed into a sequence of pulse signals in a temporal domain. The sequence of pulse signals in the temporal domain is transformed into a sequence of pulse signals in a frequency domain. Peaks are detected within relevant frequency bands in the sequence of pulse signals in the frequency domain. A fundamental frequency is identified within the peaks. The fundamental frequency, which represents the TCP flow clock, is returned. | 04-14-2011 |
20110096662 | Inferring TCP Initial Congestion Window - A packet trace is received. Inter-arrival times between the multiple packets in the packet trace are determined. An inter-arrival time in the inter-arrival times that is greater than a threshold is identified. An order number of the inter-arrival time is identified. A determination is made as to whether a size of each of at least a portion of the multiple packets is equal to a maximum segment size. When a determination is made that the size of each of at least a portion of the multiple packets is equal to the maximum segment size a size of the ICW as a product of the order number and the maximum segment size is returned. | 04-28-2011 |
20110103256 | Detecting Irregular Retransmissions - A packet trace is received. Transmitted bytes and retransmitted bytes are identified in the packet trace. Upon identifying the transmitted bytes and the retransmitted bytes in the packet trace, one or more time-rate pairs are determined from the packet trace. The time-rate pairs are plotted on a rate tracking graph. | 05-05-2011 |
20110153788 | Method and System for Automated Network Operations - A system includes a memory storing a set of instructions executable by a processor. The set of instructions is operable to receive a process for accomplishing a network management task, the process including a plurality of events including configuration changing events and condition checking events; receive parameters related to the task; include the parameters in the process; and execute the process. | 06-23-2011 |
20120057571 | METHOD AND APPARATUS FOR NORMALIZING CELLULAR COMMUNICATIONS NETWORK DATA - A method, computer readable medium and apparatus for normalizing cellular communications network data are disclosed. For example, the method collects a data packet from the cellular communications network, modifies a time stamp of the data packet in accordance with a promotion delay time from the time stamp of the data packet to create a normalized data packet and processes the normalized data packet to optimize state machine configurations. | 03-08-2012 |
20120058773 | METHOD AND APPARATUS FOR PERFORMING A DEMOTION IN A CELLULAR COMMUNICATIONS NETWORK - A method, computer readable medium and apparatus for performing a demotion in a cellular communications network are disclosed. For example, the method receives a packet indicating that a batching transfer is completed, determines if a background packet was received after receiving the packet indicating that the batching transfer is completed and demotes a state of a state machine implemented by a radio network controller to a lower state if the background packet was not received. | 03-08-2012 |
20120120812 | METHOD AND APPARATUS FOR INFERRING STATE TRANSITIONS IN A WIRELESS COMMUNICATIONS NETWORK - A method, a computer readable medium and an apparatus for inferring state transitions in a wireless communications network are disclosed. In one embodiment, the method infers a state promotion procedure. In another embodiment, the method infers a state demotion procedure. | 05-17-2012 |
20120122405 | METHOD AND APPARATUS FOR PROVIDING A DYNAMIC INACTIVITY TIMER IN A WIRELESS COMMUNICATIONS NETWORK - A method, a computer readable medium and an apparatus for providing a dynamic inactivity timer are disclosed. For example, the method monitors a timer for a time threshold associated with a burst of a plurality of bursts of packets, and determines if the timer for the time threshold associated with the burst has expired. The method predicts an inter-burst time for the burst, if the timer for the time threshold associated with the burst has expired and sets the dynamic inactivity timer in accordance with the inter-burst time for the burst. | 05-17-2012 |
20120151041 | INTELLIGENT MOBILITY APPLICATION PROFILING TOOL - Systems and methods for analyzing mobile device applications within a wireless data network are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user. | 06-14-2012 |
20120155319 | METHOD AND APPARATUS FOR CHARACTERIZING INFRASTRUCTURE OF A CELLULAR NETWORK - A method and apparatus for characterizing an infrastructure of a wireless network are disclosed. For example, the method obtains a first data set from a server log, and obtains a second data set from a plurality of wireless endpoint device. The method characterizes a parameter of the infrastructure of the wireless network using the first data set and the second data set and optimizes a network resource of the wireless network based on the parameter. | 06-21-2012 |
20120307678 | Inferring TCP Initial Congestion Window - A packet trace is received. Inter-arrival times between the multiple packets in the packet trace are determined. An inter-arrival time in the inter-arrival times that is greater than a threshold is identified. An order number of the inter-arrival time is identified. A determination is made as to whether a size of each of at least a portion of the multiple packets is equal to a maximum segment size. When a determination is made that the size of each of at least a portion of the multiple packets is equal to the maximum segment size, a size of the ICW as a product of the order number and the maximum segment size is returned. | 12-06-2012 |
20120324041 | BUNDLING DATA TRANSFERS AND EMPLOYING TAIL OPTIMIZATION PROTOCOL TO MANAGE CELLULAR RADIO RESOURCE UTILIZATION - Techniques for increasing power and resource efficiency of a mobile device are presented herein. In the mobile device, with regard to periodic or one-time data transfers, a communication management component can analyze information comprising data transfer parameter information, including jitter information, associated with each application of a subset of applications used by the device and can desirably schedule and/or bundle data transfers associated with the applications to reduce the number of separate data bursts to transfer that data to thereby reduce use of wireless resources and power consumption by the device. A push notification system can receive respective jitter information associated with each application from the mobile device, and the push notification system can desirably schedule and/or bundle push notifications to reduce the number of separate data bursts sent to the device to reduce use of wireless resources and power consumption by the device. | 12-20-2012 |
Patent application number | Description | Published |
20110125802 | Operating a Network Using Relational Database Methodology - In one embodiment, the disclosed technology involves modeling network elements, such as router configurations and link information, as well as any generic network status, as data in a relational database. Various network data, such as router states and link states are abstracted into tables in the relational database. Network management operations may then be represented as a series of transactional database queries and insertions. As a result, the database automatically propagates, to the appropriate network elements, state changes that are written to database tables, thereby implementing various network operations. Tables in the database can be constructed at various levels of abstraction, as required to satisfy network operational demands. Programmability is provided by a declarative language composed of a series of database queries and insertions. | 05-26-2011 |
20110125810 | Operating a Network Using Relational Database Methodology - In one embodiment, the disclosed technology involves modeling network elements, such as router configurations and link information, as well as any generic network status, as data in a relational database. Various network data, such as router states and link states are abstracted into tables in the relational database. Network management operations may then be represented as a series of transactional database queries and insertions. As a result, the database automatically propagates, to the appropriate network elements, state changes that are written to database tables, thereby implementing various network operations. Tables in the database can be constructed at various levels of abstraction, as required to satisfy network operational demands. Programmability is provided by a declarative language composed of a series of database queries and insertions. | 05-26-2011 |
20120005243 | Operating a Network Using Relational Database Methodology - The disclosed technology involves the use of relational databases in conjunction with declarative language and network-wide, database abstractions to manage and operate networks. The data model creates a logically centralized database abstraction and access point for managing data relevant to network management. Exemplary managed data includes router configurations, network status and provisioning data. This information resides in a single database system which is tightly integrated with the operational network. Transactional write operations are used to change network configurations, and enforce constraints to detect and prevent policy violations during operation. In accordance with one aspect of the disclosed technology, a network operation is implemented by means of a series of database commands—read and/or write—from and to database view tables. | 01-05-2012 |
Patent application number | Description | Published |
20110208958 | COMMUNICATING USING A CLOUD INFRASTRUCTURE - A cloud infrastructure that communicates with computing devices is provided. The computing devices install filters on other computing devices that they wish to receive items from including pictures, messages, and documents. The filters include criteria that are evaluated on the computing devices, rather than at a server, to determine if an item may be sent to another computing device. The computing devices may then send items that match the criteria to the cloud infrastructure, and the items may be stored and queued for delivery to other computing devices. The items may be encrypted before being provided to the cloud infrastructure, and decrypted when received by the computing devices. | 08-25-2011 |
20120246720 | USING SOCIAL GRAPHS TO COMBAT MALICIOUS ATTACKS - Detection of user accounts associated with spammer attacks may be performed by constructing a social graph of email users. Biggest connected components (BCC) of the social graph may be used to identify legitimate user accounts, as the majority of the users in the biggest connected components are legitimate users. BCC users may be used to identify more legitimate users. Using degree-based detection techniques and PageRank based detection techniques, the hijacked user accounts and spammer user accounts may be identified. The users' email sending and receiving behaviors may also be examined, and the subgraph structure may be used to detect stealthy attackers. From the social graph analysis, legitimate user accounts, malicious user accounts, and compromised user accounts can be identified. | 09-27-2012 |
20130315088 | INTELLIGENT MOBILITY APPLICATION PROFILING TOOL - Analyzing mobile device applications within a wireless data network and other related aspects are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user. | 11-28-2013 |