Patent application number | Description | Published |
20150027125 | PROCESS FOR HARVESTING, STORING, AND USING RENEWABLE ENERGY TO PROPEL AND POWER BOATS AND SHIPS, AND MAXIMIZE THEIR AVERAGE SPEED - A boat or ship (marine vessel) can be powered and propelled by using wind or solar energy. This propulsion results in the forward movement and six degrees of motion (roll, heave, pitch, yaw, surge, and sway) of the marine vessel. These motions have kinetic energy. This invention capitalizes on the fact that the solar wind and wave energy are cyclical by nature. The present invention enables the vessel to store energy harvested from these energy sources during periods when levels of energy is available from wind, solar, or the motion of the vessel in waves. This invention makes this stored energy available for use during periods when the external natural sources of energy (wind, wave, or solar) are not available in adequate quantities to maintain a reasonable speed of advance for the marine vessel. The harvesting of the energy during high energy cycles, storing it and using it when needed in this invention allows a marine vessel to get maximum speed of advance over a course. In this invention the marine vessel can maintain faster average speed without reliance on any fossil or chemical fuel and by only using renewable energy sources. In this invention the vessel is normally driven by wind channeling methods like canvas or foil sails or Flettner rotors. In addition to this, the vessel can be propelled by propulsion thrusters such as propellers, rim driven thrusters, azimuthing drives, water jets or other means of thrusting and propelling the vessel. These propulsion devices are driven by regenerative electric motors using stored electric energy in batteries on the vessel. The energy stored in the battery bank is used to provide supplemental or primary propulsion during cyclical periods when natural sources of wind, wave or solar energy are low. These same thrusters and their electric motors work in reverse to generate and harvest energy when wind levels are high and as the marine vessel is moving forward at higher speeds while being propelled by wind energy. In this invention the batteries, which are dense and heavy, to store this energy, are secured in the bottom of the marine vessel also serve as ballast to keep the vessel upright. This serves to lower the marine vessel's center of gravity to get the maximum hull stability for safety. This also helps the vessel channel maximum available wind energy to propel the vessel and harvest energy whenever stronger winds permit. | 01-29-2015 |
Patent application number | Description | Published |
20120254582 | TECHNIQUES AND MECHANISMS FOR LIVE MIGRATION OF PAGES PINNED FOR DMA - Techniques for migrating data from a first range of physical memory locations to a second range of physical memory locations. The second range of physical memory locations is allocated for migration of data from the first range of physical memory locations Pending transactions for the first range of physical memory locations are flushed. One or more address translation entries are reprogrammed. Data is migrated from the first range of physical memory locations to the second range of physical memory locations. Subsequent memory transactions are processed to cause the transactions to be directed to the second range of physical memory locations. | 10-04-2012 |
20130007507 | MECHANISM FOR ADVANCED SERVER MACHINE CHECK RECOVERY AND ASSOCIATED SYSTEM SOFTWARE ENHANCEMENTS - Embodiments of a hardware processor including a plurality of machine state registers (MSRs) are described. At least one of the MSRs includes an erroring logical processing (ELP) bit which when set, indicates that a particular thread executing on the hardware processor caused an error. | 01-03-2013 |
20140189445 | SIGNALING SOFTWARE RECOVERABLE ERRORS - Embodiments of an invention for signaling software recoverable errors are disclosed. In one embodiment, a processor includes a first unit, a programmable indicator, and a second unit. The first unit is to detect a poison error. The programmable indicator is to indicate whether the poison error is signaled as a machine check error or as one of a fault and a system management interrupt. The second unit is to signal the poison error as one of a fault and a system management error responsive to the programmable indicator. | 07-03-2014 |
20150095705 | Instruction and Logic for Machine Checking Communication - A processor includes a logic to determine an error condition reported in an error bank. The error bank is communicatively coupled to the processor and is associated with logical processors of the processor. The processor includes another logic to generate an interrupt indicating the error condition. The processor includes yet another logic to selectively send the interrupt to a single one of the logical processors associated with the error bank. | 04-02-2015 |
20150113334 | DETERMINE WHEN AN ERROR LOG WAS CREATED - A computing system can include a machine check counter (MCC) including a current value. The current value indicates a system reboot resetting hardware of the computing system. The machine check counter includes a model specific register including a counter indicating the current value, the current value to be incremented upon the system reboot. | 04-23-2015 |
20150178142 | EXCHANGE ERROR INFORMATION FROM PLATFORM FIRMWARE TO OPERATING SYSTEM - A computing system can include a platform firmware to monitor hardware errors and to notify an operating system when a corrective action is to be performed to address a hardware error. The computing system can also include an extended error log to describe a hardware error. The computing system can further include an action record to direct the operating system to perform the corrective action to address the hardware error. | 06-25-2015 |
20150186231 | Allocating Machine Check Architecture Banks - In accordance with embodiments disclosed herein, there is provided systems and methods for allocating machine check architecture banks. The processing device includes a plurality of machine check architecture banks to communicate a machine check error. The processing also includes an allocator to allocate during runtime of the processor a target machine check architecture bank of the plurality of machine check architecture banks. The runtime of the processor is during an occurrence of the machine check error. | 07-02-2015 |
20150317892 | CONTEXT BASED ALERT SYSTEM - An embodiment allows for context based alerts/alarms. For example, an embodiment may automatically determine that a user is in a meeting with another person based on a meeting entry in the user's calendar. In such a situation the embodiment may divert an incoming phone call, which would ordinarily result in a ring tone, to go directly to voice mail based on the calendar entry. In an embodiment the alert may be delayed until the meeting concludes. Unlike conventional systems, various embodiments do not require a user to change notification rules, manually flip a hardware switch, or create a “Do Not Disturb” setting that allows just a single “silent” time during the day. An embodiment allows data in a calendar to automatically drive the behavior of how a notification panel operates. Other embodiments are described herein. | 11-05-2015 |
20160092220 | Instruction and Logic for Machine Check Interrupt Management - A processor includes a front end including a decoder to decode an instruction, a scheduler to assign execution of the instruction to a core, and a core to execute the instruction. The instruction specifies that interrupts such as corrected machine check interrupts are to be selectively suppressed. The processor further includes an error handling unit including logic to determine that an interrupt caused by an error is to be created and that an error consumer has requested interrupt notification. The error handling unit further includes logic to, based on the instruction specifying that interrupts are to be selectively suppressed, send the interrupt to a producer that issued the instruction rather than the error consumer. | 03-31-2016 |
Patent application number | Description | Published |
20090092472 | Apparatus and system for handling a glass sheet - A method of conveying a glass substrate utilizing an improved non-contact lifting device. The non-contact lifting device employs the Bernoulli effect to create a pressure differential across the glass substrate. The Bernoulli device of the present invention comprises an increased holding or lifting power, and reduces the opportunity for contact between the device and the glass substrate if the device is tilted with respect the plane of the glass substrate surface. | 04-09-2009 |
20100112910 | LINEAR PRESSURE FEED GRINDING WITH VOICE COIL - The present invention is directed to an apparatus for grinding or polishing at least one edge of a glass substrate. The apparatus includes a grinding unit configured to remove a predetermined amount of material from the edge when in an aligned position. The grinding unit applies a predetermined force normal to the edge. An air bearing slide system is coupled to the grinding unit. The air bearing slide system is configured to slide along a predetermined axis on a thin film of pressurized air that provides a zero friction load bearing interface. A linear actuation motor is coupled to the air bearing slide system. The linear actuation motor is configured to control the movement of the air bearing slide system such that the grinding unit is moved from a non-aligned position to the aligned position. | 05-06-2010 |
20140030959 | LINEAR PRESSURE FEED GRINDING WITH VOICE COIL - The present invention is directed to an apparatus for grinding or polishing at least one edge of a glass substrate. The apparatus includes a grinding unit configured to remove a predetermined amount of material from the edge when in an aligned position. The grinding unit applies a predetermined force normal to the edge. An air bearing slide system is coupled to the grinding unit. The air bearing slide system is configured to slide along a predetermined axis on a thin film of pressurized air that provides a zero friction load bearing interface. A linear actuation motor is coupled to the air bearing slide system. The linear actuation motor is configured to control the movement of the air bearing slide system such that the grinding unit is moved from a non-aligned position to the aligned position. | 01-30-2014 |
20140144213 | APPARATUS AND METHODS FOR TESTING A HONEYCOMB FILTER - Methods of testing a honeycomb filter include the step of wetting the outer peripheral surface of the honeycomb filter to enhance the flow of fog through outer peripheral channels of the honeycomb network of channels. In further examples, methods include the step of obstructing a flow of fog through inner peripheral channels to enhance the flow of fog through the outer peripheral channels of the honeycomb network of channels. In further examples, apparatus for testing a honeycomb filter include a flow diverter with a blocking member. | 05-29-2014 |
20140335764 | LINEAR PRESSURE FEED GRINDING WITH VOICE COIL - The present invention is directed to an apparatus for grinding or polishing at least one edge of a glass substrate. The apparatus includes a grinding unit configured to remove a predetermined amount of material from the edge when in an aligned position. The grinding unit applies a predetermined force normal to the edge. An air bearing slide system is coupled to the grinding unit. The air bearing slide system is configured to slide along a predetermined axis on a thin film of pressurized air that provides a zero friction load bearing interface. A linear actuation motor is coupled to the air bearing slide system. The linear actuation motor is configured to control the movement of the air bearing slide system such that the grinding unit is moved from a non-aligned position to the aligned position. | 11-13-2014 |
Patent application number | Description | Published |
20130150442 | OLIGO-BENZAMIDE COMPOUNDS AND THEIR USE IN TREATING CANCERS - The present invention includes bis- and tris-benzamide compounds that block AR signaling and have activity against prostate cancer. Uses for these compounds, and pharmaceutical compositions containing the same, also are provided. | 06-13-2013 |
20130184345 | OLIGO-BENZAMIDE COMPOUNDS FOR USE IN TREATING CANCERS - The present invention provides bis- and tris-benzamide compounds in the treatment of breast, brain and ovarian cancers. | 07-18-2013 |
20130231385 | OLIGO-BENZAMIDE COMPOUNDS AND THEIR USE - The present invention includes bis- and tris-benzamide compounds that block AR signaling and have anticancer activity. Uses for these compounds, and pharmaceutical compositions containing the same, also are provided. | 09-05-2013 |
20140323568 | OLIGO-BENZAMIDE COMPOUNDS AND THEIR USE IN TREATING CANCERS - The present invention includes bis- and tris-benzamide compounds that block AR signaling and have activity against prostate cancer. Uses for these compounds, and pharmaceutical compositions containing the same, also are provided. | 10-30-2014 |
20160031803 | OLIGO-BENZAMIDE COMPOUNDS AND THEIR USE IN TREATING CANCERS - The present invention includes bis- and tris-benzamide compounds that block AR signaling and have activity against prostate cancer. Uses for these compounds, and pharmaceutical compositions containing the same, also are provided. | 02-04-2016 |
Patent application number | Description | Published |
20110307888 | PROTECTION OF VIRTUAL MACHINES EXECUTING ON A HOST DEVICE - Technology is described for protection of virtual machines executing on a host device having host processors and host memory. The system can include a hypervisor configured to enable the virtual machines to execute concurrently on the host device. An emancipated partition can be provided with a communication channel to the hypervisor. A primary partition can be configured to interface with the emancipated partition through the communication channel via the hypervisor. In addition, an emancipated memory space and virtual register state for the emancipated partition can be protected from direct access by the primary partition. | 12-15-2011 |
20120324236 | Trusted Snapshot Generation - A hypervisor provides a snapshot protocol that generates a verifiable snapshot of a target machine. The verifiable snapshot includes a snapshot and a signed quote. In one implementation, a challenger requests a snapshot of the target machine. In response to the snapshot request, the hypervisor initiates Copy-on-Write (CoW) protection for the target machine. The hypervisor snapshots and hashes each of the memory pages and the virtual central processing unit (CPU) of the target machine. The hypervisor generates a composite hash by merging all individual memory page hashes and the CPU state hash. The hypervisor requests a quote including integrity indicators of all trusted components and the composite hash. The quote uses a cryptographic signature from a trusted platform module, which ensures that any compromise of the integrity of the snapshot is detectable. The snapshot and signed quote are returned to the challenger for verification. | 12-20-2012 |
20120331550 | TRUSTED LANGUAGE RUNTIME ON A MOBILE PLATFORM - Disclosed is a trusted language runtime (TLR) architecture that provides abstractions for developing a runtime for executing trusted applications or portions thereof securely on a mobile device (e.g., a smartphone). TLR offers at least two abstractions to mobile developers: a trustbox and a trustlet. The trustbox is a runtime environment that offers code and data integrity, and confidentiality. Code and data running inside a trustbox cannot be read or modified by any code running outside the trustbox. A trustlet is the code portion of an application that runs inside a trustbox. With TLR, programmers can write applications in .NET and specify which parts of the application handle sensitive data, and thus, run inside the trustbox. With the TLR, the developer places these parts in a trustlet class, and the TLR provides all support needed to run the parts in the trustbox. | 12-27-2012 |
20130031374 | FIRMWARE-BASED TRUSTED PLATFORM MODULE FOR ARM PROCESSOR ARCHITECTURES AND TRUSTZONE SECURITY EXTENSIONS - A “Firmware-Based TPM” or “fTPM” ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional hardware based Trusted Platform Module (TPM), isolation is achieved without the use of dedicated security processor hardware or silicon. In general, the fTPM is first instantiated in a pre-OS boot environment by reading the fTPM from system firmware or firmware accessible memory or storage and placed into read-only protected memory of the device. Once instantiated, the fTPM enables execution isolation for ensuring secure code execution. More specifically, the fTPM is placed into protected read-only memory to enable the device to use hardware such as the ARM® architecture's TrustZone™ extensions and security primitives (or similar processor architectures), and thus the devices based on such architectures, to provide secure execution isolation within a “firmware-based TPM” without requiring hardware modifications to existing devices. | 01-31-2013 |
20130047197 | SEALING SECRET DATA WITH A POLICY THAT INCLUDES A SENSOR-BASED CONSTRAINT - Technologies pertaining to limiting access to secret data through utilization of sensor-based constraints are described herein. A sensor-based constraint is a constraint that can only be satisfied by predefined readings that may be output by at least one sensor on a mobile computing device. If the sensor on the mobile computing device outputs a reading that satisfies the sensor-based constraint, secret data is provided to a requesting application. Otherwise, the requesting application is prevented from accessing the secret data. | 02-21-2013 |
20130054948 | Attestation Protocol for Securely Booting a Guest Operating System - In a cloud computing environment, a production server virtualization stack is minimized to present fewer security vulnerabilities to malicious software running within a guest virtual machine. The minimal virtualization stack includes support for those virtual devices necessary for the operation of a guest operating system, with the code base of those virtual devices further reduced. Further, a dedicated, isolated boot server provides functionality to securely boot a guest operating system. The boot server is isolated through use of an attestation protocol, by which the boot server presents a secret to a network switch to attest that the boot server is operating in a clean mode. The attestation protocol may further employ a secure co-processor to seal the secret, so that it is only accessible when the boot server is operating in the clean mode. | 02-28-2013 |
20130102276 | SPLIT BILLING FOR A MOBILE DEVICE - The claimed subject matter provides a method for split billing. The method includes receiving a requested token. The requested token specifies conditions under which network traffic is allowed to be billed against a third party for content requested from a mobile computing device. The method also includes matching network traffic between the mobile computing device and a content provider to the specified conditions. The method further includes metering the matched network traffic to a billing account for the third party. | 04-25-2013 |
20130159729 | SOFTWARE-BASED TRUSTED PLATFORM MODULE - A “Firmware-Based TPM” or “fTPM” ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional hardware based Trusted Platform Module (TPM), isolation is achieved without the use of dedicated security processor hardware or silicon. In general, the fTPM is first instantiated in a pre-OS boot environment by reading the fTPM from system firmware or firmware accessible memory or storage and placed into read-only protected memory of the device. Once instantiated, the fTPM enables execution isolation for ensuring secure code execution. More specifically, the fTPM is placed into protected read-only memory to enable the device to use hardware such as the ARM® architecture's TrustZone™ extensions and security primitives (or similar processor architectures), and thus the devices based on such architectures, to provide secure execution isolation within a “firmware-based TPM” without requiring hardware modifications to existing devices. | 06-20-2013 |
20140006805 | Protecting Secret State from Memory Attacks | 01-02-2014 |
20140359270 | ATTESTATION PROTOCOL FOR SECURELY BOOTING A GUEST OPERATING SYSTEM - In a cloud computing environment, a production server virtualization stack is minimized to present fewer security vulnerabilities to malicious software running within a guest virtual machine. The minimal virtualization stack includes support for those virtual devices necessary for the operation of a guest operating system, with the code base of those virtual devices further reduced. Further, a dedicated, isolated boot server provides functionality to securely boot a guest operating system. The boot server is isolated through use of an attestation protocol, by which the boot server presents a secret to a network switch to attest that the boot server is operating in a clean mode. The attestation protocol may further employ a secure co-processor to seal the secret, so that it is only accessible when the boot server is operating in the clean mode. | 12-04-2014 |
20150156330 | SPLIT BILLING FOR A MOBILE DEVICE - The claimed subject matter provides a method for split billing. The method includes receiving a requested token. The requested token specifies conditions under which network traffic is allowed to be billed against a third party for content requested from a mobile computing device. The method also includes matching network traffic between the mobile computing device and a content provider to the specified conditions. The method further includes metering the matched network traffic to a billing account for the third party. | 06-04-2015 |
20160048678 | TRUSTZONE-BASED INTEGRITY MEASUREMENTS AND VERIFICATION USING A SOFTWARE-BASED TRUSTED PLATFORM MODULE - A “Firmware-Based TPM” or “fTPM” ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional hardware based Trusted Platform Module (TPM), isolation is achieved without the use of dedicated security processor hardware or silicon. In general, the fTPM is first instantiated in a pre-OS boot environment by reading the fTPM from system firmware or firmware accessible memory or storage and placed into read-only protected memory of the device. Once instantiated, the fTPM enables execution isolation for ensuring secure code execution. More specifically, the fTPM is placed into protected read-only memory to enable the device to use hardware such as the ARM® architecture's TrustZone™ extensions and security primitives (or similar processor architectures), and thus the devices based on such architectures, to provide secure execution isolation within a “firmware-based TPM” without requiring hardware modifications to existing devices. | 02-18-2016 |
Patent application number | Description | Published |
20080260373 | DETERMINING A FINAL EXPOSURE SETTING AUTOMATICALLY FOR A SOLID STATE CAMERA WITHOUT A SEPARATE LIGHT METERING CIRCUIT - An embodiment of the invention is a method of generating a final exposure setting, including, (a) selecting one of a number of predetermined exposure settings as a current exposure setting for a solid state camera having a camera imager, (b) generating a captured scene by the camera imager using the current exposure setting, (c) selecting according to an automated search methodology another one of the exposure settings to be the current setting in response to the captured scene being underexposed or overexposed, and, (d) repeating (b) and (c) until the captured scene is neither underexposed or overexposed. | 10-23-2008 |
20100315531 | DETERMINING A FINAL EXPOSURE SETTING AUTOMATICALLY FOR A SOLID STATE CAMERA WITHOUT A SEPARATE LIGHT METERING CIRCUIT - An embodiment of the invention is a method of generating a final exposure setting, including, (a) selecting one of a number of predetermined exposure settings as a current exposure setting for a solid state camera having a camera imager, (b) generating a captured scene by the camera imager using the current exposure setting, (c) selecting according to an automated search methodology another one of the exposure settings to be the current setting in response to the captured scene being underexposed or overexposed, and, (d) repeating (b) and (c) until the captured scene is neither underexposed or overexposed. | 12-16-2010 |
20120013762 | DETERMINING A FINAL EXPOSURE SETTING AUTOMATICALLY FOR A SOLID STATE CAMERA WITHOUT A SEPARATE LIGHT METERING CIRCUIT - An embodiment of the invention is a method of generating a final exposure setting, including, (a) selecting one of a number of predetermined exposure settings as a current exposure setting for a solid state camera having a camera imager, (b) generating a captured scene by the camera imager using the current exposure setting, (c) selecting according to an automated search methodology another one of the exposure settings to be the current setting in response to the captured scene being underexposed or overexposed, and, (d) repeating (b) and (c) until the captured scene is neither underexposed or overexposed. | 01-19-2012 |
20140160313 | DETERMINING A FINAL EXPOSURE SETTING AUTOMATICALLY FOR A SOLID STATE CAMERA WITHOUT A SEPARATE LIGHT METERING CIRCUIT - An embodiment of the invention is a method of generating a final exposure setting, including, (a) selecting one of a number of predetermined exposure settings as a current exposure setting for a solid state camera having a camera imager, (b) generating a captured scene by the camera imager using the current exposure setting, (c) selecting according to an automated search methodology another one of the exposure settings to be the current setting in response to the captured scene being underexposed or overexposed, and, (d) repeating (b) and (c) until the captured scene is neither underexposed or overexposed. | 06-12-2014 |
Patent application number | Description | Published |
20140035465 | LIFETIME CORRECTION FOR AGING OF LEDS IN TUNABLE-WHITE LED LIGHTING DEVICES - A lighting system having at least three light sources receives an input relating to color coordinates of a target point representing a desired color characteristic for a combined output from the light sources. The system provides color tunable output and/or dimmable output in response to differences in user input. The system also corrects changes in performance of the light sources due to lifetime degradation in each of the light sources. After a period of system operation, outputs of the sources are measured. The system increases the luminosity outputs of each of the light sources by a respective amount relative to the degradations measured in all the light sources; in this manner, the luminosity outputs of the light sources remain substantially constant in relations to each other over the lifetime of the light sources. | 02-06-2014 |
20140035472 | REDUCING LUMEN VARIABILITY OVER A RANGE OF COLOR TEMPERATURES OF AN OUTPUT OF TUNABLE-WHITE LED LIGHTING DEVICES - A system provides white light having a selectable spectral characteristic (e.g. a selectable color temperature, delta uv, and intensity) using a combination of sources (e.g. LEDs) emitting light of three, four, five, or six different characteristics, for example, one or more white LEDs, and one or more LEDs of each of three primary colors, plus cyan and royal blue. A controller maintains a desired spectral characteristic, e.g. for white light at a selected point on or within a desired range of the black body curve. In addition, the controller provides selectable adjustments for values of the spectral characteristics, while maintaining substantially constant overall output intensity for the light output of White LEDs, thereby achieving Maximum Utilization. | 02-06-2014 |
Patent application number | Description | Published |
20090264277 | Picoscale catalysts for hydrogen catalysis - A catalyst for hydrogen generation from an alkaline aqueous solution of hydrogen containing salts comprising a silicon-based ceramic surface covered with a mixture of metals known as transition metals and noble metals. The silicon-based ceramic surface may be self-supporting or may be deposited as a thin film on a carbonaceous substrate. The carbonaceous surface may be self-supporting or be in the form of a film that is supported on a substrate of a fourth material, where the fourth material has the function of providing physical support to the substrate. The said carbonaceous substrate can be made from a solid material or from a porous structure, of which carbon nanotube paper, also known as Bucky paper, is one example. | 10-22-2009 |
20100294230 | Polymer-Derived Nanocomposite Lubricant For Ultra-Low Wear Applications - Polymer-derived nanocomposite lubricants reduce friction and wear in applications involving elevated temperatures, such as within an internal combustion engine. | 11-25-2010 |
20120003547 | Electrode Material, Lithium-Ion Battery And Related Methods - An electrode comprising a cast-film architecture wherein a silicon-based polymer precursor is cast on to a current collector directly from the liquid, and processed in-situ to create a high performance anode for lithium ion batteries. In this in-situ process the liquid polymer is cross-linked and pyrolyzed to create a cast-film-anode architecture. The cast-film architecture is distinctly different from the conventional powder-based ex-situ process whereby the polymer precursor is made into powders by a ex-situ process; with these powders being then combined with conducting agents and binders to create a paste which is screen printed on a current collector to produce electrode with a powder-anode architecture. The cast-film architecture obviates the need for conducting agents and binders, simplifying the production process for the anode, without a loss in performance. The energy capacity per unit volume of the anode material is two to ten times greater for the cast architecture. | 01-05-2012 |
20130085055 | METHODS OF FLASH SINTERING - This disclosure provides methods of flash sintering and composition created by these methods. | 04-04-2013 |
20140306381 | METHODS OF FLASH SINTERING - This disclosure provides methods of flash sintering and compositions created by these methods. Methods for sintering multilayered bodies are provided in which a sintered body is produced in less than one minute. In one aspect, each layer is of a different composition, and may be constituted wholly from a ceramic or from a combination of ceramic and metallic particles. When the body includes a layer of an anode composition, a layer of an electrolyte composition and a layer of a cathode composition, the sintered body can be used to produce a solid oxide fuel cell. | 10-16-2014 |
Patent application number | Description | Published |
20140365182 | SYSTEMS AND METHODS FOR FEEDBACK WHILE DESIGNING AN ARCHITECTURAL STRUCTURE - Various embodiments provide systems and methods enable a user to receive feedback regarding a computer-implemented design of an architectural structure as the user is designing or otherwise modifying the computer-implemented design using a computer-aided design (CAD) software tool. The feedback (hereafter also referred to as “design feedback”) may provide the user with useful analysis information regarding the architectural structure's predicted characteristics (e.g., operational performance, resource consumption, cost, etc.) based on the current state of the computer-implemented design. As the user performs one or more actions on the computer-implemented design model (e.g., through the CAD software tool), particularly with respect to the geometry or texture of the computer-implemented design model, systems and methods can provide the impact of those actions, possibly at or near the time the actions were executed (e.g., at or near real-time). | 12-11-2014 |
20150234944 | SYSTEMS AND METHODS FOR DISPLAYING IMPACT ANALYSIS DATA WHILE DESIGNING AN ARCHITECTURAL STRUCTURE - Various embodiments provide systems and methods enabling a user to receive feedback regarding a computer-implemented design of an architectural structure as the user is designing or otherwise modifying the computer-implemented design using a computer-aided design (CAD) software tool. The feedback (hereafter also referred to as “design feedback”) may provide the user with useful analysis information regarding the architectural structure's predicted characteristics (e.g., operational performance, resource consumption, cost, etc.) based on the current state of the computer-implemented design. In particular, heating and cooling loads associated with the computer-implemented design of the architectural structure can be visually displayed to the user in real or near-real-time along with the relationships to contributing factors that impact the heating and cooling loads. | 08-20-2015 |
20150234945 | REAL-TIME SPATIAL DAYLIGHTING ANALYSIS FOR A 3D GEOMETRIC STRUCTURE - Various embodiments provide systems and methods enabling a user to receive feedback regarding a computer-implemented design of an architectural structure as the user is designing or otherwise modifying the computer-implemented design using a computer-aided design (CAD) software tool. The feedback (hereafter also referred to as “design feedback”) may provide the user with useful analysis information regarding the architectural structure's predicted characteristics (e.g., operational performance, resource consumption, cost, etc.) based on the current state of the computer-implemented design. In particular, daylighting analyses pertinent to the computer-implemented design of the architectural structure can be visually displayed to the user in real or near-real-time. | 08-20-2015 |
Patent application number | Description | Published |
20090012958 | MULTIPLE STRING SEARCHING USING TERNARY CONTENT ADDRESSABLE MEMORY - A method and apparatus for multiple string searching using a ternary content addressable memory. For one embodiment, the method includes receiving a text string having a plurality of characters and performing an unanchored search of a database of a stored patterns matching one or more characters of the text string using a state machine, wherein the state machine comprises a ternary content addressable memory (CAM) and wherein the performing comprises comparing a state and one of the plurality of characters with contents of a state field and a character field, respectively, stored in the ternary CAM. In various embodiments, one or more of the following search features may be supported: exact string matching, inexact string matching, single character wildcard matching, multiple character wildcard matching, case insensitive matching, parallel matching and rollback. | 01-08-2009 |
20160055743 | Congo: System and Method of Transportation Using Carrier Vehicles and Personal Transport Vehicles - In accordance with one embodiment a person uses a personal transport vehicle to ride to a pickup point. At the pickup point, both the person and his/her personal transport vehicle get on a carrier vehicle. Carrier vehicle transports them from the pickup point to the drop off point. While in transit, the carrier vehicle also recharges the battery on the personal transport vehicle. Hence the acronym CONGO, stands for Charge ON the GO. At the drop off point person gets off the carrier vehicle along with the personal transport vehicle and covers the remainder of the distance to the desired destination on the personal transport vehicle. According to one embodiment persons use an application software on a smart phone to communicate their requests for a ride to a scheduler system and receive directions therefrom. A scheduler system receives requests and status updates from persons and carrier vehicles and controls the overall operation of the transportation system. | 02-25-2016 |