Patent application number | Description | Published |
20090072391 | Structurally-enhanced integrated circuit package and method of manufacture - A chip scale integrated circuit package includes an integrated circuit chip which has a first face and a second face. A plurality of pillar bumps are formed on the first face of the integrated circuit chip. An encapsulant material encapsulates the sides and the first face of the integrated circuit chip, and the pillar bumps. Upper ends of the pillar bumps remain free form encapsulant material and a substantially planar surface is formed by an upper surface of the encapsulant material and the upper ends of the pillar bumps. A plurality of solder balls are mounted on the substantially planar surface in locations corresponding to the upper ends of the pillar bumps. | 03-19-2009 |
20100150704 | WIND TURBINE WITH A REFRIGERATION SYSTEM AND A METHOD OF PROVIDING COOLING OF A HEAT GENERATING COMPONENT IN A NACELLE FOR A WIND TURBINE - The invention provides a wind turbine wind turbine with two vessels, each being interchangeably in thermal communication with a heating medium which transfers heat from a heat generating structure to the vessel, and with a cooling medium which transfers heat from the vessel to an ambient space. The vessels form a compression structure which form part of a refrigerating circuit which can circulate a working fluid between the compression structure, a condenser and an evaporator. At the evaporator, cooling effect is obtained based on evaporation of a working fluid, and the cooling can be utilized for cooling a heat generating component in the wind turbine. | 06-17-2010 |
20110095539 | Cooling system for a wind turbine - A wind turbine having a cooling system, which wind turbine includes a nacelle in connection with which one or more wind turbine components are arranged, is disclosed. The cooling system includes at least one cooling circuit arranged to lead a heat transfer medium to and from one or more of the wind turbine components, at least one cooling device arranged to cool the heat transfer medium, at least one pump arranged in connection with the at least one cooling circuit to circulate the heat transfer medium in the cooling circuit, and at least one medium tank arranged in connection with the cooling circuit. The at least one medium tank is arranged inside the nacelle. | 04-28-2011 |
20120025537 | WIND TURBINE NACELLE WITH COOLER TOP - The present invention relates to a wind turbine nacelle comprising a front end facing a wind flow and a rear end arranged downwind from the front end; a first face with a longitudinal extension between the front end and the rear end of the nacelle, the longitudinal extension of the nacelle having a total length; a velocity boundary layer, which is created by the wind flow along the first face from the front end to the rear end, the velocity boundary layer increasing in thickness along the first face and the thickness being lowest at the front end; and a free flow cooling device extending from the first face of the nacelle, the free flow cooling device comprising a cooling area. Furthermore, the cooling area is arranged in relation to the thickness of the velocity boundary layer. | 02-02-2012 |
20120061047 | WIND TURBINE NACELLE WITH COOLER TOP - The present invention relates to a wind turbine nacelle having a top face with a longitudinal extension in a wind direction. The nacelle comprises a cooling device having a cooling area and extending from the first face of the nacelle, and a cover having at least one inner face and at least a front edge facing the wind direction. The cooling device is enclosed by the first face of the nacelle and the inner face of the cover and is arranged in a front distance of at least 440 mm from the front edge of the cover. | 03-15-2012 |
20120063890 | WIND TURBINE NACELLE WITH COOLER TOP - The present invention relates to a wind turbine nacelle having a first face with a longitudinal extension in a wind direction, comprising a cooling device having a cooling area and extending from the first face of the nacelle, and a cover having at least one inner face, the cooling device being enclosed by the first face of the nacelle and the inner face of the cover. A first distance between at least one of the faces and the cooling area is at least 30 mm. | 03-15-2012 |
20120086215 | WIND TURBINE NACELLE WITH COOLER TOP - The present invention relates to a wind turbine nacelle having a top face with a longitudinal extension in a wind direction, comprising a cooling device extending from the top face of the nacelle and a cover having at least one inner face. The cooling device is enclosed by the top face of the nacelle and the inner face of the cover. | 04-12-2012 |
Patent application number | Description | Published |
20130254749 | DYNAMICALLY PROVIDING APPLICATION ANALYTIC INFORMATION - Methods and systems for dynamically providing application analytic information are provided herein. The method includes inserting instrumentation points into an application file via an application analytic service and dynamically determining desired instrumentation points from which to collect application analytic data. The method also includes receiving, at the application analytic service, the application analytic data corresponding to the desired instrumentation points and analyzing the application analytic data to generate application analytic information. The method further includes sending the application analytic information to a client computing device. | 09-26-2013 |
20130332442 | DEEP APPLICATION CRAWLING - The deep application crawling technique described herein crawls one or more applications, commonly referred to as “apps”, in order to extract information inside of them. This can involve crawling and extracting static data that are embedded within apps or resource files that are associated with the apps. The technique can also crawl and extract dynamic data that apps download from the Internet or display to the user on demand, in order to extract data. This extracted static and/or data can then be used by another application or an engine to perform various functions. For example, the technique can use the extracted data to provide search results in response to a user query entered into a search engine. Alternately, the extracted static and/or dynamic data can be used by an advertisement engine to select application-specific advertisements. Or the data can be used by a recommendation engine to make recommendations for goods/services. | 12-12-2013 |
20140082214 | REDUCING NETWORK USAGE OF COMPUTING DEVICE - Methods and systems for reducing network usage of a computing device are provided herein. The method includes receiving a network call relating to a network transfer from an application at an application programming interface of the computing device. The method also includes determining whether the network transfer is relevant to a current state of the application and procrastinating the network transfer if it is not relevant to the current state of the application. | 03-20-2014 |
20140280443 | APPLICATION-CENTRIC SOCIALIZATION - An application may be augmented for application-centric socialization activities for a user of the application, based on instrumenting the application for the application-centric socialization activities. The application-centric socialization activities may be launched from within the augmented application on a device, the application-centric socialization activities determined based on one or more contexts associated with the user that are determined during execution of the augmented application on the device. | 09-18-2014 |
20140372216 | CONTEXTUAL MOBILE APPLICATION ADVERTISEMENTS - Aspects of the subject disclosure are directed towards retrieving advertisements relevant to application content based upon keywords extracted from the application content. In one aspect, a client-side component scrapes application page content to obtain keywords and feature-based weights for those keywords. The keywords are sent to an advertisement server, which returns an advertisement based upon one or more of the keywords. Also described is the hashing of keywords before sending to the advertisement server to protect client privacy, and the use of a Bloom filter to avoid sending keywords to the advertisement server that do not correspond to (e.g., popular) advertisement keywords. | 12-18-2014 |
20140380282 | MONITORING MOBILE APPLICATION PERFORMANCE - Aspects of the subject disclosure are directed towards monitoring application performance during actual use, particularly mobile application performance. Described is instrumenting mobile application binaries to automatically identify a critical path in user transactions, including across asynchronous-call boundaries. Trace data is logged by the instrumented application to capture UI manipulations, thread execution, asynchronous calls and callbacks, UI updates and/or thread synchronization. The trace data is analyzed to assist developers in improving application performance. | 12-25-2014 |
20150186524 | DEEP APPLICATION CRAWLING - The deep application crawling technique described herein crawls one or more applications, commonly referred to as “apps”, in order to extract information inside of them. This can involve crawling and extracting static data that are embedded within apps or resource files that are associated with the apps. The technique can also crawl and extract dynamic data that apps download from the Internet or display to the user on demand, in order to extract data. This extracted static and/or data can then be used by another application or an engine to perform various functions. For example, the technique can use the extracted data to provide search results in response to a user query entered into a search engine. Alternately, the extracted static and/or dynamic data can be used by an advertisement engine to select application-specific advertisements. Or the data can be used by a recommendation engine to make recommendations for goods/services. | 07-02-2015 |
20160086225 | DEEP APPLICATION CRAWLING - The deep application crawling technique described herein crawls one or more applications, commonly referred to as “apps”, in order to extract information inside of them. This can involve crawling and extracting static data that are embedded within apps or resource files that are associated with the apps. The technique can also crawl and extract dynamic data that apps download from the Internet or display to the user on demand, in order to extract data. This extracted static and/or data can then be used by another application or an engine to perform various functions. For example, the technique can use the extracted data to provide search results in response to a user query entered into a search engine. Alternately, the extracted static and/or dynamic data can be used by an advertisement engine to select application-specific advertisements. Or the data can be used by a recommendation engine to make recommendations for goods/services. | 03-24-2016 |
Patent application number | Description | Published |
20100075697 | WIFI AND GSM LANDMARKS AND NEIGHBORHOODS FOR LOCATION BASED SERVICES - A system for capturing and delivering location-based information and services captures wireless landmark information sent by mobile devices to build a map of locations based on the relationship between wireless landmarks that are visible to the mobile device at the same time. A wireless landmark may be a cellular telephone base site or local network (WiFi/Bluetooth) access point. The mobile device may capture a location signature using identifiers for all wireless local area networks in range as well as one or more cellular telephone transmitters. A location service resolves the location signature into a relative location that an application service may use to record incoming information or to send location-specific information such as traveler comments, reviews, or advertisements. The distance between two mobile devices may be calculated using weighted edge values, representing a number of ‘hops’ between location signatures. | 03-25-2010 |
20110256853 | WIFI AND GSM LANDMARKS AND NEIGHBORHOODS FOR LOCATION BASED SERVICES - A system for capturing and delivering location-based information and services captures wireless landmark information sent by mobile devices to build a map of locations based on the relationship between wireless landmarks that are visible to the mobile device at the same time. A wireless landmark may be a cellular telephone base site or local network (WiFi/Bluetooth) access point. The mobile device may capture a location signature using identifiers for all wireless local area networks in range as well as one or more cellular telephone transmitters. A location service resolves the location signature into a relative location that an application service may use to record incoming information or to send location-specific information such as traveler comments, reviews, or advertisements. The distance between two mobile devices may be calculated using weighted edge values, representing a number of ‘hops’ between location signatures. | 10-20-2011 |
20110271345 | DETECTION OF ROGUE WIRELESS DEVICES FROM DYNAMIC HOST CONTROL PROTOCOL REQUESTS - A method to determine if a rogue device is connected to a specific wired network from dynamic host control protocol (DHCP) requests on the wired network. These DHCP requests are analyzed to determine the type of device issuing the request. Once the type of device has been determined, it can be checked against a list of authorized device types. If the device issuing the DHCP request is not an authorized device type, then it can be determined that the suspect device is a rogue that is connected to the specific wired network. Additionally, even if the system of the present invention determines that it is an authorized device type, if the device is not one of the few authorized devices of this type, e.g. because its MAC address is not recognized as that of one of the authorized devices, the system can flag the suspect as a rogue. | 11-03-2011 |
Patent application number | Description | Published |
20090315678 | RFID-BASED ENTERPRISE INTELLIGENCE - An “RFID-Based Inference Platform” provides various techniques for using RFID tags in combination with other enterprise sensors to track users and objects, infer their interactions, and provide these inferences for enabling further applications. Specifically, observations are collected from combinations of RFID tag reads and other enterprise sensors including electronic calendars, user presence identifiers, cardkey access logs, computer logins, etc. Given sufficient observations, the RFID-Based Inference Platform automatically differentiates between tags associated with or affixed to people and tags affixed to objects. The RFID-Based Inference Platform then infers additional information including identities of people, ownership of specific objects, the nature of different “zones” in a workspace (e.g., private office versus conference room). These inferences are then used to enable various applications including object tracking, automated object ownership determinations, automated object cataloging, automated misplaced object alerts, video annotations, automated conference room scheduling, semi-automated object image catalogs, object interaction query systems, etc. | 12-24-2009 |
20110211517 | EFFICIENT AND RELIABLE MULTICAST OVER A Wi-Fi NETWORK - A “Wi-Fi Multicaster” provides a practical and efficient Wi-Fi multicast system for environments having potentially large numbers of Wi-Fi clients. Significantly, the Wi-Fi Multicaster does not require any changes to the 802.11 protocol, or to the underlying Wi-Fi infrastructure. In various embodiments, the Wi-Fi Multicaster uses pseudo-broadcast, and augments it with destination control, association control and optional proactive FEC (forward error correction) to improve multicast performance. More specifically, the Wi-Fi Multicaster system converts multicast packets to targeted unicast transmissions. To minimize the amount of airtime consumed, the Wi-Fi Multicaster uses destination control in combination with various algorithms for association control. Further, in various embodiments, the Wi-Fi Multicaster includes an adaptive, proactive FEC scheme to reduce overall packet losses. Finally, to overcome the challenges posed by encryption protocols such as 802.1x, the Wi-Fi Multicaster uses a “virtual multicast interface” that allows clients to “share” a common key for each multicast. | 09-01-2011 |
Patent application number | Description | Published |
20090185514 | WIRELESS COMMUNICATIONS ENVIRONMENT OVERLAY - A method is provided, wherein the method comprises identifying nearby wireless communication access points (APs) to which a client computing environment can cooperate with to communicate and receive data through a subscription to a neighborcast group from indentified nearby cooperating access points such that illustratively the neighborcast group comprises a communications overlay between cooperating client computing environments employing the identified nearby wireless communications access points. In an illustrative implementation, a wireless communications environment comprises at least two client computing environments comprising a communications overlay engine operable to process at least one instruction from an exemplary instruction set to perform one or more wireless communications operations over the exemplary communications overlay comprising scanning for cooperating client computing environments and/or wireless access points and/or RSS servers, subscribing to the communications overlay group, and publishing data for consumption by cooperating components of the wireless communications overlay. | 07-23-2009 |
20110227704 | RFID-BASED ENTERPRISE INTELLIGENCE - An “RFID-Based Inference Platform” provides various techniques for using RFID tags in combination with other enterprise sensors to track users and objects, infer their interactions, and provide these inferences for enabling further applications. Specifically, observations are collected from combinations of RFID tag reads and other enterprise sensors including electronic calendars, user presence identifiers, cardkey access logs, computer logins, etc. Given sufficient observations, the RFID-Based Inference Platform automatically differentiates between tags associated with or affixed to people and tags affixed to objects. The RFID-Based Inference Platform then infers additional information including identities of people, ownership of specific objects, the nature of different “zones” in a workspace (e.g., private office versus conference room). These inferences are then used to enable various applications including object tracking, automated object ownership determinations, automated object cataloging, automated misplaced object alerts, video annotations, automated conference room scheduling, semi-automated object image catalogs, object interaction query systems, etc. | 09-22-2011 |
Patent application number | Description | Published |
20150055859 | NOTE RECOGNITION AND MANAGEMENT USING COLOR CLASSIFICATION - This disclosure describes techniques for creating and manipulating software notes representative of physical notes. For example, techniques are described for recognizing physical notes present within a physical environment, capturing information therefrom and creating corresponding digital representations of the physical notes, referred to herein as digital notes or software-based notes. At least some aspects of the present disclosure feature system and methods for note recognition using color classification. The system receives a visual representation of a scene having one or more notes, where each note has a color. The system generates indicators indicative of color classes of pixels in the visual representation. The system further determines a general boundary of one of the notes based on the indicators. | 02-26-2015 |
20150106699 | NOTE RECOGNITION FOR OVERLAPPING PHYSICAL NOTES - Techniques for creating and manipulating software notes representative of physical notes are described. A computing device includes a processor, an image collection module executable by the processor and configured to receive an input image of an environment having a plurality of overlapping physical notes, and an image processing engine executable by the processor and configured to process the input image with the computing device to identify the plurality of overlapping physical notes in the input image. The image processing engine determines a boundary of each note in the plurality of overlapping physical notes in the input image, and generates a plurality of digital notes corresponding to the determined boundary of each of the overlapping physical notes identified in the input image. | 04-16-2015 |
20150220257 | NOTE CAPTURE AND RECOGNITION WITH MANUAL ASSIST - At least some aspects of the present disclosure feature a computing device configured to receive an input image of an environment having a plurality of physical notes. The computing device automatically processes the input image to identify at least some of the plurality of the physical notes in the input image and displays the input image and indications indicative of the identified physical notes on a user interface. The computing device receives a user input indicating a position within the input image via a user interface and, responsive to the user input, recognizes proximate to the position a missed one of the physical notes that was not identified by the computing device when initially processing the input image. | 08-06-2015 |
20160004811 | DETECTING TOOTH WEAR USING INTRA-ORAL 3D SCANS - A method for detecting tooth wear using digital 3D models of teeth taken at different times. The digital 3D models of teeth are segmented to identify individual teeth within the digital 3D model. The segmentation includes performing a first segmentation method that over segments at least some of the teeth within the model and a second segmentation method that classifies points within the model as being either on an interior of a tooth or on a boundary between teeth. The results of the first and second segmentation methods are combined to generate segmented digital 3D models. The segmented digital 3D models of teeth are compared to detect tooth wear by determining differences between the segmented models, where the differences relate to the same tooth to detect wear on the tooth over time. | 01-07-2016 |
20160070821 | METHOD OF ALIGNING INTRA-ORAL DIGITAL 3D MODELS - Methods for aligning a digital 3D model of teeth represented by a 3D mesh to a desired orientation within a 3D coordinate system. The method includes receiving the 3D mesh in random alignment and changing an orientation of the 3D mesh to align the digital 3D model of teeth with a desired axis in the 3D coordinate system. The methods can also detect a gum line in the digital 3D model to remove the gingiva from the model. | 03-10-2016 |
Patent application number | Description | Published |
20140320510 | DETECTION OF A HOT-PLUG EVENT OF COUPLING A TARGET DISPLAY IN A STANDBY MODE TO A SOURCE DEVICE TO ENABLE AUTOMATIC TRANSITIONING OF THE TARGET DISPLAY TO AN ACTIVE MODE OF OPERATION THEREOF - A method includes detecting, through a processor of a source device and/or a processor of a target display communicatively coupled to a memory, a hot-plug event indicating coupling of the target display to the source device without shutting down both the source device and the target display when the target display is in a standby mode of operation thereof. The method also includes transitioning, through the processor of the source device and/or the processor of the target display, the target display from the standby mode of operation to an active mode of operation thereof based on a control signal from the processor of the source device and/or the processor of the target display following the detection of the hot-plug event. The active mode is associated with a higher power level than the standby mode. | 10-30-2014 |
20150049069 | AUTOMATIC BACKUP OF CONFIGURATION-RELATED SETTINGS IN A DATA PROCESSING DEVICE - A method includes executing an instance of a process on a data processing device, and controlling configuration of a display unit, a processor, a memory and/or a power supply of the data processing device through a user interface provided by the process and/or an operating system executing on the data processing device based on continued execution of the instance of the process. The method also includes providing a capability to automatically backup, through the processor in conjunction with a driver component associated with the display unit, the processor and/or the power supply, settings related to one or more specific parameter(s) of the display unit, a screen of the display unit, the processor, the memory, an algorithm executing on the processor and/or the power supply of the data processing device through the user interface as a non-system file to the memory and/or a storage device external to the data processing device. | 02-19-2015 |