Patent application number | Description | Published |
20140045864 | ACID ADDITION SALTS OF RISPERIDONE AND PHARMACEUTICAL COMPOSITIONS THEREOF - The present invention relates to a novel acid addition salt of risperidone, wherein acid counterion is selected from the group consisting of pamoic acid, caproic acid, cypionic acid, decanoic acid, camphor sulfonic acid, enanthic acid, palmitic acid, fusidic acid, gluceptic acid, gluconic acid, lactobionic acid, lauric acid, levulinic acid and valeric acid, a process for the preparation and pharmaceutical composition comprising the same. Further, the invention relates to the use of said pharmaceutical composition comprising the acid addition salt of risperidone in the treatment of patient suffering from psychotic disorders. | 02-13-2014 |
20140243278 | Acid Addition Salt of Donepezil and Pharmaceutical Composition Thereof - Disclosed is an acid addition salt of donepezil, wherein acid counterion is selected from the group consisting of pamoic acid, cypionic acid, camphor sulfonic acid, enanthic acid, fusidic acid, gluceptic acid, gluconic acid, lactobionic acid, lauric acid, valeric acid, Dibenzoyl-D-Tartaric acid and terephthalic acid. Disclosed is a process for the preparation and pharmaceutical composition comprising the same. More specifically, disclosed is concerned with the pamoate acid addition salts of donepezil. Disclosed also is long acting formulation comprising the acid addition salt of donepezil and process for the preparation thereof. | 08-28-2014 |
Patent application number | Description | Published |
20130024106 | System and apparatus providing localized evacuation guidance - A method and apparatus for detecting hazardous gases. The method includes the steps of providing a central station and a plurality of environmental detectors within a protected area, each of the, plurality of environmental detectors detecting environmental events within the protected area and reporting detected events to the central station, one of the plurality of environmental detectors detecting an environmental event within the protected area and reporting that event to the central station, the central station determining a location of the detected event and of each of the plurality of environmental detectors within the protected area, the central station dynamically computing a route from the determined location of each of the plurality of environmental detectors to the closest and safest exit based upon the determined location of the detected environmental event and the central station generating and sending a respective map showing the computed route to the closest and safest exit for that environmental detector to each of the plurality of environmental detectors. | 01-24-2013 |
20130185024 | SYSTEM FOR AUTOMATIC OBJECT CLASSIFICATION AND TAGGING IN AN RF PLANNING TOOL - A system and method store a map of an area in a computer storage device. The map includes objects in the area. Objects on the map and locations of the objects on the map are identified, and properties are associated to the identified objects. The identified objects, the locations of the identified objects, and the properties of the identified objects are provided to a radio frequency (RF) planning tool such that the RF planning tool can determine RF wave propagation and RF wave attenuation as a function of the identified objects, the locations of the identified objects, and the properties of the identified objects. | 07-18-2013 |
20130201025 | Method of Monitoring a Gas Leakage Incident - A system for monitoring a gas leakage incident in an industrial facility comprises a local area network, and a plurality of closed-circuit television cameras operatively connected to the local area network. The closed-circuit television cameras are positioned to provide video images of plural areas in a facility, with a central station operatively connected to the network for receiving video images from the television cameras. As plurality of gas detectors positioned in plural areas of the facility are operatively connected to the local area network, with each gas detector being operable to provide a signal which indicates occurrence of a gas leakage incident. Real-time monitoring of one or more gas-leakage incidents facilitates efficient evacuation of operating personnel, with the system preferably configured to automatically direct one or more of the closed-circuit television cameras to the area from which a gas leakage signal originates. | 08-08-2013 |
20140192041 | TOP VIEW SITE MAP GENERATION SYSTEMS AND METHODS - Systems and methods for top view site map generation can include receiving a number of non-top view images of an area and generating a top view site map for the area utilizing the number of non-top view images. | 07-10-2014 |
20140323138 | RADIO FREQUENCY DEVICE PLACEMENT TOOL - The present disclosure relates to displaying a bounded placement region for each radio frequency (RF) device in a map of a site to be used by an installer to install RF devices in the site. | 10-30-2014 |
20150046140 | NODE PLACEMENT PLANNING - Methods, systems, and computer-readable and executable instructions are described herein. One method includes identifying a number of structural rules of an area utilizing a map of the area, determining a placement for each node of a number of nodes of a node network on the map of the area utilizing a node placement model, identifying a placement of a node among the number of nodes that deviates from a structural rule among the number of the structural rules, and providing an indication of the node on the map of the area. | 02-12-2015 |
20150062331 | SITE SURVEYING - Systems, methods, and devices for site surveying are described herein. For example, one or more embodiments include receiving a map associated with a site, identifying a number of points on the map associated with the site with a computing device, determining a distance between the number of points based on data associated with a camera in communication with the computing device, and calibrating a length between the number of points on the map with the determined distance. | 03-05-2015 |
20150102926 | System and Method to Monitor Events and Personnel Locations - A method and apparatus where the apparatus performs the steps of receiving a location of a person; determining via a database a hazard level of the location confirming via a database that the person is qualified to be present at the location based upon a training level of the person for the determined hazard level of the location and wirelessly notifying the person to leave the location upon determining that the person is not qualified for the hazard level of the location based upon the training level of the person. | 04-16-2015 |
20150248824 | SYSTEM AND METHOD FOR LOCATION TAGGED HEADCOUNT ACCOUNTING - A method and apparatus including the steps of a first file defining a set of geographic coordinates of a work area, a second file defining a set of geographic coordinates of a mustering zone, a plurality of portable wireless sensors, each having a geographic positioning system, each carried by a person within the work area and each determining its geographic location, an environmental monitoring system detecting a threat within the work area, a processor detecting a location of each of the plurality of wireless sensors and a processor generating an alert for each of the plurality of portable sensors that have not arrived within the mustering area within a predetermined time after the detected threat. | 09-03-2015 |
20150264581 | METHOD OF PLACING WIRELESS DEVICES FOR RF PLANNING - The method includes showing a site map on a display. The site map displays a first area of a location in which RF devices are to be installed; using an interface UI to select a bounded placement region that is part of the first area; partitioning the bounded placement region; generating an updated site map that identifies locations within the partitioned bounded placement region(s) where RF devices are to be installed within the partitioned bounded placement region; moving one or more of the RF devices on the site map to generate a further updated site map that identifies locations within the partitioned bounded placement region where RF devices are to be installed; adjusting the bounded placement region on the site map to generate a further updated site map that identifies locations within the partitioned bounded placement region where RF devices are to be installed. | 09-17-2015 |
20150364138 | COMPUTER-GENERATED SPEECH DEVICE FOR SITE SURVEY AND MAINTENANCE - Computer-generated speech devices for site survey and maintenance, and methods of using the same are described herein. One computer-generated speech device includes a location engine to determine a location of the computer-generated speech device at a site, a solution engine to identify an action to perform associated with one of a plurality of nodes at the site using the location of the computer-generated speech device and input data associated with the plurality of nodes, and a speech engine to broadcast the identified action as computer-generated speech using a speaker component of the computer-generated speech device for a user to perform during a survey and/or maintenance of the site. | 12-17-2015 |
Patent application number | Description | Published |
20130067065 | DETECTING DEVICE PRESENCE FOR A LAYER 3 CONNECTION USING LAYER 2 DISCOVERY INFORMATION - Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired. | 03-14-2013 |
20130067068 | EVENT-DRIVEN DETECTION OF DEVICE PRESENCE FOR LAYER 3 SERVICES USING LAYER 2 DISCOVERY INFORMATION - Techniques for detecting presence of a remote device at Layer 2 in response to an indication of an attempt to use the device and without maintaining a Layer 3 connection to the device. The techniques allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection to the remote device to provide services to a user. The Layer 3 connection and underlying Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated when the Layer 3 connection is not actively used. Once use of the remote device is desired, its presence may be detected using a Layer 2 device discovery mechanism and the Layer 2 and Layer 3 connections to the device may be reestablished. Services provided at Layer 3, such as steaming data, may then be performed over the reestablished Layer 3 connection. | 03-14-2013 |
20140289396 | Detecting Device Presence for a Layer 3 Connection Using Layer 2 Discovery Information - Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired. | 09-25-2014 |
Patent application number | Description | Published |
20120239857 | SYSTEM AND METHOD TO EFFICIENTLY SCHEDULE AND/OR COMMIT WRITE DATA TO FLASH BASED SSDs ATTACHED TO AN ARRAY CONTROLLER - An apparatus comprising a controller and an array. The controller may be configured to generate control signals in response to one or more input requests. The array may comprise a plurality of solid state devices. The solid state devices may be configured to (i) read and/or write data in response to the control signals received from the controller and (ii) distribute writes across the plurality of solid state devices such that each of said solid state devices has a similar number of writes. | 09-20-2012 |
20120260007 | VARYING HOST INTERFACE SIGNALING SPEEDS IN A STORAGE ARRAY - An apparatus comprising an interface circuit and a controller. The interface circuit may be configured to calculate a speed signal in response to data traffic measured over a network. The controller may be configured to present and receive data from an array in response to (a) the speed signal and (b) one or more input/output requests. The interface circuit may generate the speed signal in response to a plurality of predetermined factors. The controller may present and receive the data at one of a plurality of speeds in response to the speed signal. | 10-11-2012 |
20120265994 | SYSTEM AND METHOD TO ESTABLISH AND/OR MANAGE A TRUSTED RELATIONSHIP BETWEEN A HOST TO STORAGE ARRAY CONTROLLER AND/OR A STORAGE ARRAY TO STORAGE ARRAY CONTROLLER - A method for establishing a secure connection between a first computer and a second computer, comprising the steps of (A) generating a signature authentication pair on the first computer, (B) receiving a plurality of authentication pairs that may or may not include the signature authentication pair, (C) detecting whether the signature authentication pair is received in the authentication pairs and (D) if the signature authentication pair is detected, creating a secure connection between the first computer and the second computer. | 10-18-2012 |
20130007531 | SYSTEM AND METHOD TO FLAG A SOURCE OF DATA CORRUPTION IN A STORAGE SUBSYSTEM USING PERSISTENT SOURCE IDENTIFIER BITS - An apparatus comprising an array controller and a frame buffer. The array controller may be configured to read/write data to/from a drive array in response to one or more input/output requests. The frame buffer may be implemented within the array controller and may be configured to perform (i) a first data integrity check to determine a first type of data error and (ii) a second data integrity check to determine a second type of data error. The frame buffer may log occurrences of the first type of error and the second type of error in a field transmitted with the data. The field may be used to determine a source of possible corruption of the data. | 01-03-2013 |
Patent application number | Description | Published |
20120030125 | Method and system for tracking,archiving, reporting, and communication of time, activity, and event details - A method and system for time, activity, event tracking includes providing an application or portal or website over wireless or wired networked devices or systems, having means that allow users to keep information about all their activities and allow detailed reporting. The system also provides a plurality of tracking, archiving, reporting, communication, and management over various formats depending on user profile. The system provides services like compensate and certify user activities for personal or organizational goals and communicate and campaign about activities or promotion of products, ideas, and services. The method further includes storing user data in ranges, archiving, summarizing, aggregating of data, and using user profile and requests to initiate internal and external communication based on user profile. The method and system manage hierarchy of organizations, users; provide administrative functions over a plurality of external devices, applications, systems, media formats, websites, social media sites, and communication interfaces. | 02-02-2012 |
Patent application number | Description | Published |
20140013166 | POWER SAVING TECHNIQUES THAT USE A LOWER BOUND ON BIT ERRORS - A read back bit sequence and charge constraint information are obtained. A lower bound on a number of bit errors associated with the read back bit sequence is determined based at least in part on the read back bit sequence and the charge constraint information. The lower bound and an error correction capability threshold associated with an error correction decoder are compared. In the event the lower bound is greater than or equal to the error correction capability threshold, an error correction decoding failure is predicted and in response to the prediction a component is configured to save power. | 01-09-2014 |
20140233317 | GENERATION OF A COMPOSITE READ BASED ON NEIGHBORING DATA - A victim group of one or more cells is read using a first read threshold to obtain a first raw read which includes one or more values. The victim group of cells is read using a second read threshold to obtain a second raw read which includes one or more values. A neighboring read, corresponding to a neighboring group of one or more cells associated with the victim group of cells, is obtained. A composite read is generated, including by selecting from at least the first raw read and the second raw read based at least in part on the neighboring read. | 08-21-2014 |
20140325320 | SYNDROME TABLES FOR DECODING TURBO-PRODUCT CODES - A set of one or more component syndromes associated with a turbo product code (TPC) codeword is obtained from a component syndrome buffer. Component decoding is performed on the set of one or more component syndromes. | 10-30-2014 |
20150078084 | GENERATING READ THRESHOLDS USING GRADIENT DESCENT AND WITHOUT SIDE INFORMATION - A first bit position of a cell in solid state storage is read where a sorting bit is obtained using the read of the first bit position. A second bit position of the cell is read for a first time, including by setting a first read threshold associated with the second bit position to a first value and setting a second read threshold associated with the second bit position to a second value. The second bit position of the cell is read for a second time, including by setting the first read threshold to a third value and setting the second read threshold to a fourth value. A new value for the first read threshold and for the second read threshold is generated using the sorting bit, the first read, and the second read. | 03-19-2015 |
20150085572 | STORAGE OF READ THRESHOLDS FOR NAND FLASH STORAGE USING LINEAR APPROXIMATION - A first read threshold associated with a first page in a block and a second read threshold associated with a second page in the block are received, where the first page has a first page number and the second page has a second page number. A slope and a y intercept are determined based at least in part on the first read threshold, the second read threshold, the first page number, and the second page number. The slope and the y intercept are stored with a block identifier associated with the block. | 03-26-2015 |
20150138894 | FINDING OPTIMAL READ THRESHOLDS AND RELATED VOLTAGES FOR SOLID STATE MEMORY - A read is performed using a first iteration of a read threshold voltage that is set to a default voltage to obtain a first characteristic. A second iteration of the read threshold voltage is generated using the default voltage and an offset. A read is performed using the second iteration of the read threshold voltage to obtain a second characteristic. A third iteration of the read threshold voltage is generated using the first and second characteristics. A read is performed using the third iteration of the read threshold voltage to obtain a third characteristic. It is determined if the third characteristic is one of the two characteristics closest to a stored characteristic. If so, a fourth iteration of the read threshold voltage is generated using the two closest characteristics. | 05-21-2015 |
Patent application number | Description | Published |
20130147623 | HOME MONITORING ENHANCEMENTS - A system may include a set-top box configured to receive a television signal and provide the television signal to a media playing device, and a home monitoring device configured to obtain a video recording using a security camera, provide the video recording to a media manager device across a network, and provide information about the video recording to the set-top box. The set-top box may be further configured to provide the information about the video recording upon activation of the set-top box by a customer, receive a request to view the video recording from the customer, retrieve the video recording from the media manager device, and provide the video recording to a media playing device. | 06-13-2013 |
20130158721 | HOME MONITORING SETTINGS BASED ON WEATHER FORECAST - A system may include a set-top box, associated with a customer premises, configured to receive a television signal and provide the television signal to a television and a home monitoring device configured to obtain a weather forecast for a geographic area associated with the customer premises, determine a thermostat setting for the customer premises based on the obtained weather forecast, and provide a recommendation about the determined thermostat setting to the set-top box. The set-top box may be further configured to present the recommendation about the determined thermostat setting via the television; receive a selection of the determined thermostat setting; and provide an indication of the selection to the home monitoring device; and the home monitoring device may be further configured to apply the determined thermostat setting to a thermostat controller associated with the customer premises, in response to receiving the indication from the set-top box. | 06-20-2013 |