Aliaksei
Aliaksei Chapyzhenka, Saint Petersburg RU
Patent application number | Description | Published |
---|---|---|
20080292025 | Low Density Parity Check (Ldpc) Code Decoder - A message-passing decoder for low-density parity-check codes (LDPC) is provided using a multi-value threshold scheme which is updated throughout the decoding iterations. In an embodiment the check node processing is implemented using the min-sum principle whereby for each corresponding row of the parity check matrix a first and a second minimum value among bit reliability values is determined. Each row of the decoder comprises one or more associative processing elements controlled by a row control element to determine the two minimum values. Each column comprises one or more associative processing elements, an input processing element, and a column control element to determine hard decision bits. The usage of processing elements to construct a decoder may reduce the gate count and decrease the interconnects used to couple the elements. | 11-27-2008 |
Aliaksei Chapyzhenka, Budapeshtskaya Str RU
Patent application number | Description | Published |
---|---|---|
20080253278 | Techniques to Compress Modulation Patterns for Adaptive Bitloading - An embodiment of the present invention provides a method, comprising using a predetermined limited set of modulation patterns to perform adaptive bit loading (ABL) to compress the modulation patterns in wireless communications. | 10-16-2008 |
Aliaksei Chapyzhenka, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20150341224 | NETWORK-ON-CHIP (NoC) TOPOLOGY GENERATION - A system and method of defining the topology of a network-on-chip. The IP sockets and their data transfer connectivity are defined. The location of each IP socket is defined. A number of switches are defined so that there is at least one switch within a distance from each IP socket, the distance being less than that over which a signal propagates within one clock cycle period. The switches are coupled by links. Links may comprise pipeline stages, storage buffers, and are characterized by a data width. | 11-26-2015 |
Aliaksei Chernyshou, Farmington, CT US
Patent application number | Description | Published |
---|---|---|
20150047207 | CHAMFERING TOOL - A chamfering tool comprising: a base having first and second walls meeting each other along a longitudinal axis and defining a longitudinal recess along the bottom of the base for engaging a work piece and a longitudinal ridge along the top of the base; a viewing window in the base for viewing the work piece, the viewing window intersecting the longitudinal recess and the longitudinal ridge; and a blade clamp mounted on the base and arranged to clamp at least part of a blade in the viewing window. | 02-19-2015 |
20150047214 | T-SQUARE - A T-square for measuring and marking a panel comprises a housing; a rule mounted to the housing and arranged to engage a flat surface of a panel; a blade guide for receiving a blade, the blade guide mounted on the rule; and two moveable arms coupled to the housing and arranged to engage an edge of the panel. | 02-19-2015 |
20150048287 | PANEL LIFTER - A panel lifter comprises: a first arm comprising a panel engaging element; a second arm comprising a foot pedal; and a fulcrum for engaging the ground connected between the panel engaging element and the foot pedal; wherein the panel engaging member is moveable with respect to the foot pedal. | 02-19-2015 |
20150300819 | CARBON FIBER COMPOSITE LEVEL AND METHOD OF MANUFACTURING SAME - A composite level and a method to manufacture the composite level are provided. A composite level can have three layers of material. A first layer comprises a glass-mat material, a second layer comprises carbon fiber, and a third layer comprises a glass fabric material. A composite level can also have only two layers of material. At least one bubble vial is mounted on the level body. The method to manufacture the carbon fiber composite level comprises a pultrusion process wherein a fiber glass material and carbon fiber are saturated with resin and molded into a final shape. | 10-22-2015 |
Aliaksei Dzmitrenka, New York, NY US
Patent application number | Description | Published |
---|---|---|
20120239758 | SYSTEM AND METHOD FOR CONSUMER-TO-CONSUMER LENDING OF DIGITAL CONTENT - A consumer-to-consumer lending system and method for digital content such as digital ebooks. The lending system invention enables a user who has purchased digital content to lend that content to another user. The lending system enables a lender to extend a lending offer to a lendee and a lendee to respond to the lending offer. A lendee may accept or reject a lending offer. Upon acceptance, the lending system provides the lent content to the lendee who controls the content until returning it, purchasing it or until a predetermined lending period expires. During the lending period the lender does not have access to the lent digital content item. The lending system assists a lender with initiating a lending offer, such as providing a pre-populated email form, and delivers the lend offer notification to the target lendee. Lending offers may be initiated and notifications received over common channels, including email systems, mobile devices, and web-based user accounts. The lending process can be initiated directly from a consumer device. | 09-20-2012 |
Aliaksei Ivaniukovich, Hwaseong-Si KR
Patent application number | Description | Published |
---|---|---|
20160126289 | SEMICONDUCTOR DEVICE INCLUDING MAGNETO-RESISTIVE DEVICE - A semiconductor device comprises a magneto-resistive device capable of performing multiple functions with low power. The semiconductor device comprises a cell transistor in which a first impurity region and a second impurity region are respectively arranged on both sides of a channel region in a channel direction, a source line connected to the first impurity region of the cell transistor, and the magneto-resistive device connected to the second impurity region of the cell transistor. The first impurity region and the second impurity region are asymmetrical about a center of the cell transistor in the channel direction with respect to at least one of a shape and an impurity concentration distribution. | 05-05-2016 |
Aliaksei Ivanou, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20130262097 | SYSTEMS AND METHODS FOR AUTOMATED SPEECH AND SPEAKER CHARACTERIZATION - Systems and methods utilize individually selected modulation spectral features for speech and speaker characterization. The method involves construction of a sparse feature space and a method of finding the approximately best feature subset for attributing a specific characteristic of speech or speaker. The current selection method is based on the Kolmogorov-Smirnov statistical test applied to individual features. The characterization task can be defined empirically and no a-priori theory is necessary to explain characteristic attribution processes. Experimental results indicate that employment of selected modulation spectral features works better than the current state-of-the-art at least in some instances of speech characterization task, e.g. prediction of speaker personality traits, as it is evident from the official results of Interspeech'2012 Speaker Personality Recognition Challenge. | 10-03-2013 |
Aliaksei Krasnaberski, Dortmund DE
Patent application number | Description | Published |
---|---|---|
20140023105 | Device for deflecting laser radiation, and laser device having such a device - A device for deflecting laser radiation ( | 01-23-2014 |
Aliaksei Vavilau, Minsk BY
Patent application number | Description | Published |
---|---|---|
20100333203 | METHODS FOR DETECTING MALICIOUS PROGRAMS USING A MULTILAYERED HEURISTICS APPROACH - Three heuristic layers are used to determine whether suspicious code received at a port of a data processing device is malware. First, static analysis is applied to the suspicious code. If the suspicious code passes the static analysis, dissembling analysis is applied to the suspicious code. Preferably, if the suspicious code passes the dissembling analysis, dynamic analysis is applied to the suspicious code. | 12-30-2010 |
20130117853 | METHODS FOR DETECTING MALICIOUS PROGRAMS USING A MULTILAYERED HEURISTICS APPROACH - Three heuristic layers are used to determine whether suspicious code received at a port of a data processing device is malware. First, static analysis is applied to the suspicious code. If the suspicious code passes the static analysis, dissembling analysis is applied to the suspicious code. Preferably, if the suspicious code passes the dissembling analysis, dynamic analysis is applied to the suspicious code. | 05-09-2013 |