Patent application number | Description | Published |
20120268624 | FRAME SELECTION TO PROVIDE FOR A ZERO SHUTTER LAG IN A DIGITAL CAMERA - An apparatus, and an associated method, facilitates capturing an image in an electronic camera without having to wait for an image to settle or the camera to stabilize. Image frames are captured continuously. Data representing captured images is compressed. The compressed files are stored continuously, such that even before a shutter button is actuated, one or compressed image frames have already been recorded. When the shutter button is actuated, the largest of the compressed data files is selected for use, such as display, printing or transmission. Selection is made based on the size of the compressed image file. | 10-25-2012 |
20120281106 | APPARATUS, AND ASSOCIATED METHOD, FOR STABILIZING A VIDEO SEQUENCE - An apparatus, and an associated method, for facilitating stabilization of a recorded video sequence, formed of captured image frames. Captured image frames are cropped by a frame cropper. Cropping of an image is dependent upon lighting conditions. Upon the occurrence of a low-light, lighting condition, the amount of cropping is altered. And, when acceptable lighting conditions return, the amount of cropping is again altered, all in a manner to facilitate video stabilization. | 11-08-2012 |
20120327294 | APPARATUS, AND ASSOCIATED METHOD, FOR FACILITATING AUTOMATIC-EXPOSURE AT CAMERA DEVICE - An apparatus, and an associated method, for a device containing a camera module. An ambient light sensor senses ambient light conditions and provides an indication of the sensed conditions to an exposure setter. The exposure setter utilizes the indication of the ambient light conditions in the selection of the initial exposure. Convergence procedures are utilized to converge the exposure settings to a final exposure setting. | 12-27-2012 |
Patent application number | Description | Published |
20090253432 | System and Method for Generating a Blacklist for Femtocells - Provided are systems and methods for generating a blacklist for femtocells. According to an embodiment of the application, a mobile device generates and maintains a femtocell blacklist including an identification of at least one femtocell to be avoided by the mobile device. Upon detecting a femtocell, the mobile device determines whether the femtocell is identified in the femtocell blacklist. If the femtocell is identified in the femtocell blacklist, then the mobile device avoids any attempt to use the femtocell. This might allow the mobile device to conserve battery power and reduce wireless communication resources. Since the femtocell blacklist is generated and maintained by the mobile device, the network infrastructure does not need to generate and manage the femtocell blacklist. Also, there is no need for the mobile device to download a femtocell blacklist or updates thereof from the network infrastructure. | 10-08-2009 |
20100177705 | SYSTEM AND METHOD FOR HANDLING SIMPLE IP TO MOBILE IP TRANSITION - Methods are provided for transitioning between SIP and MIP. Mobile devices, upon detecting a new system, automatically attempt a MIP session to avoid the default position of SIP. A history is maintained of systems visited, and for systems that did not support MIP in the past, a MIP session is not attempted, but rather SIP is initiated from the start. | 07-15-2010 |
20110058476 | Methods And Apparatus For Controlling Wireless Network Operations Associated With A Flow Control Process - Techniques for controlling wireless network operations associated with a flow control process of a wireless network involving a data session established between a mobile station and a service node. The network processor examines quality of service (QoS) data associated with the data session. The network processor causes the flow control process to be bypassed for the mobile station based on the QoS data indicating that the data session is associated with a predetermined traffic class (e.g. background traffic class). This serves to prohibit the flow control process from stopping the flow of data packets in the data session without terminating the data session based on detection of an out-of-coverage condition. Otherwise, the network processor allows the flow control process to be performed for the mobile station based on the QoS data indicating that the data session is not associated with the predetermined traffic class. | 03-10-2011 |
Patent application number | Description | Published |
20100151124 | Cold gas dynamic spray apparatus, system and method - A system for cold gas dynamic spraying of particulate material has a de Laval nozzle and two or more radial particle inlets located between the throat and the outlet of the nozzle, the two or more particle inlets arranged symmetrically around a linear flow path of the nozzle. Blocking of the inlets is reduced by controlling pressure of particle carrier gas to provide a stable particulate material injection pressure before and during introduction of working gas into the nozzle, and/or by clearing the particle inlets of residual particles after a spraying process. Such a system and associated method combines benefits of both downstream and upstream cold gas spray systems. Further, a nozzle for spraying particulate material having a cross-sectional shape that is narrower in a middle section compared to edge sections provides coatings with superior cross-sectional profiles. | 06-17-2010 |
20110159138 | BLOW MOLD FOR MOLDING A CONTAINER - A blow mold is disclosed. The mold includes a pair of mold halves having an operative configuration wherein the mold halves together define a cavity for a container, the container having a main body and a characteristic selected from the group of characteristics consisting of: a push-up base; an integral finish; and an embossed or a debossed feature. Each of the pair of mold halves has a first portion and a second portion formed integrally with the first portion. When the pair of mold halves is in the operative configuration, the first portions collectively define the main body and the second portions collectively define the characteristic. At least one of the pair of mold halves has a relatively soft substrate portion and a relatively hard surface layer formed integrally with the substrate portion. | 06-30-2011 |
20130122193 | Mold Halves with Metal-Matrix Composite At Feature Areas - A mold half, especially for blow molding of thermoplastic articles, has a mold body defined at least in part by a single piece of aluminum or aluminum alloy mold material having a cavity and a pinch-off or other feature area and further having a metal-matrix composite (MMC) layer formed integrally in the mold body at the pinch-off or other feature area. A mold is fabricated from two mated mold halves. A process of producing a mold half involves machining a single piece of mold material to provide a mold body having a cavity and a pinch-off or other feature area, the pinch-off or other feature area being of smaller dimension than required for the mold half, integrally forming a metal-matrix composite layer in the pinch-off or other feature area to build up the pinch-off or other feature area to at least a dimension required for the mold half. The metal-matrix composite comprises an aluminum-nickel alloy matrix (e.g. AI-12Si alloy alloyed with Ni) having WC particles embedded therein or a aluminum matrix (e.g. AI-12Si alloy) having TiC particles embedded therein and has greater wear resistance, greater strength, greater toughness or any combination thereof than the mold material. | 05-16-2013 |
20160024633 | Cold Gas Dynamic Spray Apparatus, System and Method - A system for cold gas dynamic spraying of particulate material has a de Laval nozzle and two or more radial particle inlets located between the throat and the outlet of the nozzle, the two or more particle inlets arranged symmetrically around a linear flow path of the nozzle. Blocking of the inlets is reduced by controlling pressure of particle carrier gas to provide a stable particulate material injection pressure before and during introduction of working gas into the nozzle, and/or by clearing the particle inlets of residual particles after a spraying process. Such a system and associated method combines benefits of both downstream and upstream cold gas spray systems. Further, a nozzle for spraying particulate material having a cross-sectional shape that is narrower in a middle section compared to edge sections provides coatings with superior cross-sectional profiles. | 01-28-2016 |
Patent application number | Description | Published |
20130237232 | HANDLING OF EVENT TRIGGER REGISTRATIONS ON BBERF DURING HAND-OVER - Various exemplary embodiments relate to a method performed by a policy and charging rules node of provisioning event triggers. The method may include: receiving, from a requesting node, a request to provision a set of event triggers on a primary gateway; forwarding, to the primary gateway, the set of event triggers; storing the set of event triggers in association with a session; detecting a handover of the session; determining a new primary gateway; and forwarding, to the new primary gateway, the set of event triggers. The method may further include: receiving a message; determining whether the message includes the same set of event triggers; if the message includes the same set of event triggers, refraining from sending the set of event triggers to the primary gateway; and if the message includes a different set of event triggers, forwarding the different set of event triggers to the primary gateway. | 09-12-2013 |
20130322230 | AUTOMATIC CONNECTION RECOVERY - Various exemplary embodiments relate to a method and related network node including one or more of the following: selecting a connection of a plurality of connections; testing the selected connection to determine whether the selected connection is usable; and based on a determination that the selected connection is not usable: closing the selected connection and at least one additional connection of the plurality of connections, and reestablishing the selected connection and the at least one additional connection. | 12-05-2013 |
20130324078 | TEMPORARILY DISABLE OUT-OF-CREDIT PCC RULE - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN), the method comprising: receiving an event trigger from a policy and charging enforcement node (PCEN) indicating that a subscriber is out of credit; installing temporary PCC rules to handle the out of credit status of the subscriber; receiving an indication that the subscriber has completed a reallocation of credit action; uninstalling the temporary PCC rules and restoring the original PCC rules after receiving an indication of reallocation of credit. | 12-05-2013 |
20140051384 | OUT OF CREDIT FINAL-UNIT-ACTION RESTRICT_ACCESS HANDLING - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN), the method including: receiving an event trigger and a restriction filter rule associated with a first set of policy and charging control (PCC) rules from a policy and charging enforcement node (PCEN) indicating that a subscriber is out of credit; producing a second set of PCC rules to implement the restriction filter to handle the out of credit status of the subscriber; installing the second set of PCC rules; receiving an indication that the subscriber has received a reallocation of credit; and uninstalling the second set of PCC rules after receiving an indication that the subscriber has completed the reallocation of credit operation. | 02-20-2014 |
20140146711 | IDENTIFYING GN/GP MODE AT PCRF - A method, and machine readable storage medium is disclosed for a method performed by policy and charging rules function (PCRF) node (PCRN) in a packet switching network, for identifying a Gn/Gp mode of an adjacent network node, in which the adjacent network node which is connected directly to a Serving General Packet Radio Service (GPRS) Support Node (SGSN) node via a Gn/Gp interface, from an adjacent network node connected to a Serving Gateway (S-GW) via a S5/S8 interface, wherein the adjacent network node is a Packet Data Network Gateway (P-GW) node or a Gateway GPRS Support Node (GGSN). The method comprises receiving at the PCRN from the adjacent network node, a Diameter Credit Control Request (CCR) message requesting a IP-CAN session; determining whether the request message includes a SGSN-Address and does not include an AN-GW-Address. | 05-29-2014 |
20150049603 | APN-AMBR AUTHORIZATION IN GPRS MOBILE NETWORK - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN), the method including: receiving a credit control request (CCR) message from a packet data network gateway (PGW) based upon a general radio packet service (GPRS) internet protocol connectivity access network (IP-CAN) session request; determining that an operator policy rule specifies an aggregate maximum bit rate (APN-AMBR) value; determining that the CCR message includes an APN-AMBR value; setting an APN-AMBR value for the GPRS IP-CAN session to the APN-AMBR value specified by the operator policy rule; setting a GPRS IP-CAN session maximum bit rate download/upload (MBR DL/UL) value to the lowest of the APN-AMBR value specified by the operator policy rule and a subscriber MBR DL/UL value; and sending a credit control answer (CCA) message to the PGW with the selected APN-AMBR and MBR DL/UL values. | 02-19-2015 |
20160044683 | APN-AMBR AUTHORIZATION IN GPRS MOBILE NETWORK - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN), the method including: receiving a credit control request (CCR) message from a packet data network gateway (PGW) based upon a general radio packet service (GPRS) internet protocol connectivity access network (IP-CAN) session request; determining that no operator policy rule specifies an aggregate maximum bit rate (APN-AMBR) value; determining that the CCR message includes an APN-AMBR value; setting an APN-AMBR value for the GPRS IP-CAN session to an APN-AMBR value for a subscriber associated with the GPRS IP-CAN session; setting a GPRS IP-CAN session maximum bit rate download/upload (MBR DL/UL) value to the lowest of the subscriber APN-AMBR value and a subscriber MBR DL/UL value; and sending a credit control answer (CCA) message to the PGW with the selected APN-AMBR and MBR DL/UL values. | 02-11-2016 |
Patent application number | Description | Published |
20080270590 | DYNAMIC CONFIGURATION AND SELF-TUNING OF INTER-NODAL COMMUNICATION RESOURCES IN A DATABASE MANAGEMENT SYSTEM - A database management system in which a plurality of nodes form a database instance, each node including a communication manager for dynamically configuring inter-nodal communication resources. The communication manager receives communication resource allocation requests from clients or a self-tuning algorithm. A resource self-tuning mechanism allocates or de-allocates memory blocks used for communication resource elements dynamically in real time without cycling the instance. Memory blocks are de-allocated asynchronously by placing associated communication resource elements in quarantine until all communication resource elements associated with the memory block are quarantined. | 10-30-2008 |
20090024653 | DYNAMIC CONFIGURATION AND SELF-TUNING OF INTER-NODAL COMMUNICATION RESOURCES IN A DATABASE MANAGEMENT SYSTEM - A database management system in which a plurality of nodes form a database instance, each node including a communication manager for dynamically configuring inter-nodal communication resources. The communication manager receives communication resource allocation requests from clients or a self-tuning algorithm. A resource self-tuning mechanism allocates or de-allocates memory blocks used for communication resource elements dynamically in real time without cycling the instance. Memory blocks are de-allocated asynchronously by placing associated communication resource elements in quarantine until all communication resource elements associated with the memory block are quarantined. | 01-22-2009 |
20100223243 | AUTOMATIC DETECTION AND CORRECTION OF HOT PAGES IN A DATABASE SYSTEM - According to one embodiment of the present invention, a method for detecting and correcting hot pages in a database system is provided. According to one embodiment of the present invention, a method includes monitoring transactions involving pages in a database and determining if one of the transactions had to wait for access to one of the pages; incrementing a page contention counter each time one of the transactions had to wait for access to one of the pages. The method then determines if the page contention counter exceeds a predetermined threshold and monitors transactions on one of the pages for which the page contention count was exceeded. The method then determines if a row was accessed in the page for which the page contention count was exceeded and increments a reference count for the accessed row. the accessed rows are flagged when the reference count exceeds a second predetermined threshold. The flagged rows are moved to another page in the database. | 09-02-2010 |
20110131192 | Approaches to Reducing Lock Communications In a Shared Disk Database - Lock communications in a shared disk database system is reduced by several approaches: sending a single message to a lock manager for locks required for an operation and locks that will be required in the future, the operations may include row update, row delete, large scan, and row insert; performing an operation in two executions, where in a first execution locks required for the operation is determined without performing the operation, and in a second execution a single message is sent to a lock manager for the required locks and the operation is performed; in free space searching, sending a single message to a lock manager for row and page locks before a row insert is actually performed; and granting locks in an unfair manner. | 06-02-2011 |
20110137861 | Methods for Achieving Efficient Coherent Access to Data in a Cluster of Data Processing Computing Nodes - A coherency manager provides coherent access to shared data by receiving a copy of updated database data from a host computer through RDMA, the copy including updates to a given database data; storing the copy of the updated database data as a valid copy of the given database data in local memory; invalidating local copies of the given database data on other host computers through RDMA; receiving acknowledgements from the other host computers through RDMA that the local copies of the given database data have been invalidated; and sending an acknowledgement of receipt of the copy of the updated database data to the host computer through RDMA. When the coherency manager receives a request for the valid copy of the given database data from a host computer through RDMA, it retrieves the valid copy of the given database data from the local memory and returns the valid copy through RDMA. | 06-09-2011 |
20110137874 | Methods to Minimize Communication in a Cluster Database System - An ordering of operations in log records includes: performing update operations on a shared database object by a node; writing log records for the update operations into a local buffer by the node, the log records each including a local virtual timestamp; determining that a log flush to write the log records in the local buffer to a persistent storage is to be performed; in response, sending a request from the node to a log flush sequence server for a log flush sequence number; receiving the log flush sequence number by the node; inserting the log flush sequence number into the log records in the local buffer; and performing the log flush to write the log records in the local buffer to the persistent storage, where the log records written to the persistent storage comprises the local virtual timestamps and the log flush sequence number. | 06-09-2011 |
20110145627 | IMPROVING DATA AVAILABILITY DURING FAILURE DETECTION AND RECOVERY PROCESSING IN A SHARED RESOURCE SYSTEM - A system and method for managing shared resources is disclosed. The system includes a primary coherency processing unit which processes lock requests from a plurality of data processing hosts, the primary coherency processing unit also storing a first current lock state information for the plurality of data processing hosts, the first current lock state information including a plurality of locks held by the plurality of data processing hosts. The system further includes a standby coherency processing unit storing fewer locks than the primary coherency processing unit, the locks stored by the standby coherency processing unit being a subset of locks included in the first current lock state information, the standby coherency unit configured to perform a plurality of activities of the primary coherency processing unit using the subset of locks in response to a failure of the primary coherency processing unit. | 06-16-2011 |
20120084260 | LOG-SHIPPING DATA REPLICATION WITH EARLY LOG RECORD FETCHING - Methods, systems and program products for log-shipping data replication from a primary system to a communicatively-coupled standby system. Embodiments of the invention may receive transactional log data at a standby system, from the primary system, and before the transactional log data is written to storage on the primary system. Embodiments may then receive a notification from the primary system indicating that the corresponding log data was written to storage on the primary system, and responsive to receiving the notification, may process the received transactional log data. | 04-05-2012 |
20120089735 | Two-Level Management of Locks on Shared Resources - In a shared data system comprising one or more primary nodes and a plurality of secondary nodes, global lock manager on a primary node manages locks for shared resources by exchanging an abstract lock state with local lock managers on the secondary nodes. The abstract lock state includes a particular representation of all of the applications on the nodes that are requesting or are granted locks. The exchange of these particular lock states instead of individual requests improves performance by increasing concurrency and reducing off-machine communication. A global deadlock detector on a node detects and resolves global deadlocks, in conjunction with local deadlock detectors on the secondary nodes. | 04-12-2012 |
20140032765 | Two-Level Management of Locks on Shared Resources - In a shared data system comprising one or more primary nodes and a plurality of secondary nodes, global lock manager on a primary node manages locks for shared resources by exchanging an abstract lock state with local lock managers on the secondary nodes. The abstract lock state includes a particular representation of all of the applications on the nodes that are requesting or are granted locks. The exchange of these particular lock states instead of individual requests improves performance by increasing concurrency and reducing off-machine communication. A global deadlock detector on a node detects and resolves global deadlocks, in conjunction with local deadlock detectors on the secondary nodes. | 01-30-2014 |
20150019739 | TWO-LEVEL MANAGEMENT OF LOCKS ON SHARED RESOURCES - In a shared data system comprising one or more primary nodes and a plurality of secondary nodes, global lock manager on a primary node manages locks for shared resources by exchanging an abstract lock state with local lock managers on the secondary nodes. The abstract lock state includes a particular representation of all of the applications on the nodes that are requesting or are granted locks. The exchange of these particular lock states instead of individual requests improves performance by increasing concurrency and reducing off-machine communication. A global deadlock detector on a node detects and resolves global deadlocks, in conjunction with local deadlock detectors on the secondary nodes. | 01-15-2015 |
20150278242 | INCREASE DATABASE PERFORMANCE BY REDUCING REQUIRED COMMUNICATIONS AND INFORMATION TRANSFERS - According to embodiments of the present invention, one or more computer processors determine that a predetermined workload threshold associated with an invalidated object is not exceeded and transmits an invalidation command associated with the invalidated object to the owner of the invalidated object. The one or more computer processors instruct the modifier of the invalidated object to retain possession of a first lock on the object beyond the transaction. The one or more computer processors determine that a usage pattern associated with the invalidated object matches a predetermined usage pattern for selecting a lock that can be retained beyond an associated transaction and transmits a second lock a requestor. The one or more computer processors instruct the modifier to release possession of the first lock to the owner and transmit a first image of the current version of the invalidated object to the owner for subsequent transmission to the requestor. | 10-01-2015 |
20150278291 | INCREASE DATABASE PERFORMANCE BY REDUCING REQUIRED COMMUNICATIONS AND INFORMATION TRANSFERS - According to embodiments of the present invention, one or more computer processors determine that a predetermined workload threshold associated with an invalidated object is not exceeded and transmits an invalidation command associated with the invalidated object to the owner of the invalidated object. The one or more computer processors instruct the modifier of the invalidated object to retain possession of a first lock on the object beyond the transaction. The one or more computer processors determine that a usage pattern associated with the invalidated object matches a predetermined usage pattern for selecting a lock that can be retained beyond an associated transaction and transmits a second lock a requestor. The one or more computer processors instruct the modifier to release possession of the first lock to the owner and transmit a first image of the current version of the invalidated object to the owner for subsequent transmission to the requestor. | 10-01-2015 |