Patent application number | Description | Published |
20110128963 | SYSTEM AND METHOD FOR VIRTUAL CHANNEL COMMUNICATION - A system and method for communicating over a single virtual channel. The method includes reserving a first group of credits of a credit pool for a first traffic class and a second group of credits of the credit pool for a second traffic class. In addition, a first and second respective groups of tags are reserved from a tag pool for the first and second traffic class. A packet may then be selected from a first buffer for transmission over the virtual channel. The packet may include a traffic indicator of the first traffic class operable to allow the packet to pass a packet of the second traffic class from a second buffer. The method further includes sending the packet over the virtual channel and adjusting the first group of credits and the first group of tags based on having sent a packet of the first traffic class. | 06-02-2011 |
20140013023 | SYSTEM AND METHOD FOR SENDING ARBITRARY PACKET TYPES ACROSS A DATA CONNECTOR - A processing unit exchanges data with another processing unit across a data connector that supports a particular communication protocol. When the communication protocol is updated to support a new packet type, a specification of that new packet type may be stored within software registers included within the processing unit. Under circumstances that require the use of the new packet type, packet generation logic may read the packet specification of the new packet type, then generate and transmit a packet of the new type. | 01-09-2014 |
20140019742 | APPROACH FOR MANAGING STATE TRANSITIONS OF A DATA CONNECTOR - A microprocessor within a processing unit is configured to manage to operation of a finite state machine (FSM) that, in turn, manages the operation of a data connector. The FSM may be a hardwired chip component that adheres to a communication protocol associated with the data connector. The microprocessor is configured to execute a software application in order to (i) apply configuration changes to the processing unit during state transitions initiated by the FSM and (ii) cause the FSM to initiate specific state transitions. | 01-16-2014 |
20140307766 | ITERATIVELY SCANNING EQUALIZATION COEFFICIENTS TO OPTIMIZE SIGNAL QUALITY IN A DATA COMMUNICATION LINK - A method includes iteratively scanning, through a processor, at least a portion of a map of equalization coefficients related to channel equalization in a data communication link based on an ordinal integer step size S>1 for N (N>1) different sequences thereof to determine optimal points therein for which a signal quality in the data communication link is optimal. The method also includes performing, through the processor, a fine search for optimal equalization coefficients based on the determined optimal points. | 10-16-2014 |
Patent application number | Description | Published |
20100153658 | Deadlock Avoidance By Marking CPU Traffic As Special - Deadlocks are avoided by marking read requests issued by a parallel processor to system memory as “special.” Read completions associated with read requests marked as special are routed on virtual channel | 06-17-2010 |
20140012904 | PROVIDING BYTE ENABLES FOR PEER-TO-PEER DATA TRANSFER WITHIN A COMPUTING ENVIRONMENT - Non-contiguous or tiled payload data are efficiently transferred between peers over a fabric. Specifically, a client transfers a byte enable message to a peer device via a mailbox mechanism, where the byte enable message specifies which bytes of the payload data being transferred via the data packet are to be written to the frame buffer on the peer device and which bytes are not to be written. The client transfers the non-contiguous or tiled payload payload data to the peer device. Upon receiving the payload data, the peer device writes bytes from the payload data into the target frame buffer for only those bytes enabled via the byte enable message. One advantage of the present invention is that non-contiguous or tiled data are transferred over a fabric with improved efficiency. | 01-09-2014 |
20140082120 | EFFICIENT CPU MAILBOX READ ACCESS TO GPU MEMORY - Techniques are disclosed for peer-to-peer data transfers where a source device receives a request to read data words from a target device. The source device creates a first and second read command for reading a first portion and a second portion of a plurality of data words from the target device, respectively. The source device transmits the first read command to the target device, and, before a first read operation associated with the first read command is complete, transmits the second read command to the target device. The first and second portions of the plurality of data words are stored in a first and second portion a buffer memory, respectively. Advantageously, an arbitrary number of multiple read operations may be in progress at a given time without using multiple peer-to-peer memory buffers. Performance for large data block transfers is improved without consuming peer-to-peer memory buffers needed by other peer GPUs. | 03-20-2014 |
20150082074 | TECHNIQUE FOR SCALING THE BANDWIDTH OF A PROCESSING ELEMENT TO MATCH THE BANDWIDTH OF AN INTERCONNECT - A transmitter is configured to scale up a low bandwidth delivered by a first processing element to match a higher bandwidth associated with an interconnect. A receiver is configured to scale down the high bandwidth delivered by the interconnect to match the lower bandwidth associated with a second processing element. The first processing element and the second processing element may thus communicate with one another across the interconnect via the transmitter and the receiver, respectively, despite the bandwidth mismatch between those processing elements and the interconnect. | 03-19-2015 |
20150082075 | TECHNIQUE FOR SCALING THE BANDWIDTH OF A PROCESSING ELEMENT TO MATCH THE BANDWIDTH OF AN INTERCONNECT - A transmitter is configured to scale up a low bandwidth delivered by a first processing element to match a higher bandwidth associated with an interconnect. A receiver is configured to scale down the high bandwidth delivered by the interconnect to match the lower bandwidth associated with a second processing element. The first processing element and the second processing element may thus communicate with one another across the interconnect via the transmitter and the receiver, respectively, despite the bandwidth mismatch between those processing elements and the interconnect. | 03-19-2015 |
Patent application number | Description | Published |
20100106954 | Multi-Layer Content Protecting Microcontroller - The present invention relates to a microcontroller designed for protection of intellectual digital content. The microcontroller includes a secure CPU, a real-time cipher, and a user programmable multi-layer access control system for internal memory realized by programmable nonvolatile memory. Programmable nonvolatile memory allows in-system and in-application programming for the end user. The programmable nonvolatile memory is mainly used for program code and operating parameter storage. The multiple-layer access control is an integral part of the CPU, providing confidentiality protection to embedded digital content by controlling reading, writing, and/or execution of a code segment according to a set of user-programmed parameters. The cipher incorporates a set of cryptographic rules for data encryption and decryption with row and column manipulation for data storage. All cryptographic operations are executed in parallel with CPU run time without incurring additional latency and delay for system operation. | 04-29-2010 |
20100241830 | Transfer Triggered Microcontroller with Orthogonal Instruction Set - A microcontroller includes a program memory, data memory, central processing unit, at least one register module, a memory management unit, and a transport network. Instructions are executed in one clock cycle via an instruction word. The instruction word indicates the source module from which data is to be retrieved and the destination module to which data is to be stored. The address/data capability of an instruction word may be extended via a prefix module. If an operation is performed on the data, the source module or the destination module may perform the operation during the same clock cycle in which the data is transferred. | 09-23-2010 |
20140040584 | Multi-layer content protecting microcontroller - The present invention relates to a microcontroller designed for protection of intellectual digital content. The microcontroller includes a secure CPU, a real-time cipher, and a user programmable multi-layer access control system for internal memory realized by programmable nonvolatile memory. Programmable nonvolatile memory allows in-system and in-application programming for the end user. The programmable nonvolatile memory is mainly used for program code and operating parameter storage. The multiple-layer access control is an integral part of the CPU, providing confidentiality protection to embedded digital content by controlling reading, writing, and/or execution of a code segment according to a set of user-programmed parameters. The cipher incorporates a set of cryptographic rules for data encryption and decryption with row and column manipulation for data storage. All cryptographic operations are executed in parallel with CPU run time without incurring additional latency and delay for system operation. | 02-06-2014 |
Patent application number | Description | Published |
20140006190 | Secure Payments with Untrusted Devices | 01-02-2014 |
20140095564 | System and Method with Specific Ordered Execution Over Physical Elements - The invention relates to semiconductor devices, and more particularly, to systems, devices and methods of utilizing inherent differences among physical elements in an electrical component to generate unique and non-duplicable numbers that are statistically random and repeatable. These bits may be applied as identifications, random number seeds or encryption keys in many security applications, e.g., a financial terminal. An integrator is coupled to a plurality of physical elements, selects two physical elements or element sets, and generates an integrated difference signal according to a difference between these two physical elements or element sets. A comparison-decision logic further determines whether the difference between the selected two physical elements is associated with a bit of “1” or “0”. In some embodiments, a multi-bit number constitutes multiple bits each of which may be derived from a difference between two randomly selected physical elements or element sets. | 04-03-2014 |
20140369495 | Secure modules using unique identification elements - Various embodiments of the invention relate to secure systems and modules, and more particularly, to systems, devices and methods of generating and applying identification elements uniquely associated with modules or elements. These unique identification elements provide an improved, statistically random source from which keys may be derived. The application of these keys across various architectures result in an improvement in the security of data communicated within a system. | 12-18-2014 |
20160087795 | SECURE MEMORIES USING UNIQUE IDENTIFICATION ELEMENTS - Various embodiments of the invention relate to secure systems and modules, and more particularly, to systems, devices and methods of generating and applying identification elements uniquely associated with memory, memory mapping and encrypted storage. These unique identification elements provide an improved, statistically random source from which keys and memory mappings may be derived. The application of these keys across various architectures result in an improvement in the security of data stored within a system. | 03-24-2016 |
20160099714 | SYSTEMS AND METHODS FOR ENHANCING CONFIDENTIALITY VIA LOGIC GATE ENCRYPTION - Presented are systems and methods that allow hardware designers to protect valuable IP and information in the hardware domain in order to increase overall system security. In various embodiments of the invention this is accomplished by configuring logic gates of existing logic circuitry based on a key input. In certain embodiments, a logic function provides results that are dependent not only on input values but also on an encrypted logic key that determines connections for a given logic building block, such that the functionality of the logic function cannot be determined by reverse engineering. In some embodiments, the logic key is created by decrypting a piece of data using a secret decryption key. Advantages of automatic encryption include that existing circuitry need not be re-implemented or re-built, and that the systems and methods presented are backward compatible with standard manufacturing tools. | 04-07-2016 |
Patent application number | Description | Published |
20110015293 | POLYETHER NATURAL OIL POLYOLS AND POLYMERS THEREOF - A polyether NOP comprises at least two natural oil moieties separated by a molecular structure having at least about 19 ether groups or by a polyether molecular structure having an equivalent weight of at least about 480, said polyol referred to hereinafter as a polyether NOP. The polyether NOP is preferably prepared by a process comprising admixing at least one polyether initiator having an equivalent weight of at least about 480 or at least about 19 ether groups per active hydrogen group with at least one natural oil or derivative thereof under reaction conditions such that at least one polyether NOP is formed. The invention includes reaction products of the polyether NOP or combinations thereof, optionally and preferably in admixture with at least one other polyol which preferably includes at least one polyether polyol and at least one monomer reactive therewith, preferably at least one polyisocyanate to form a polyurethane, preferably in the form of a foam, especially a high resilience foam. The invention includes articles comprising at least one polyether NOP, at least one polymer thereof, or at least one foam thereof. | 01-20-2011 |
20120238654 | Process to Prepare Open Cell Foams Made with Natural Oil Based Polyols and Poly(Propylene Oxide) Polyols - Methods of forming olyurethane foams that are the reaction product of at least one polyisocyanate and a polyol composition are provided. The polyol composition includes at least one natural oil based polyol and at least one poly(propylene oxide) polyol and is desirably free of non-natural oil based polyols made from alkylene oxide units, other than propylene oxide units. The natural oil based polyol is present in a quantity sufficient to increase the processing window for the foam relative to a foam made using the same process and the same components, absent the natural oil based polyol. As a result, the present foams can provide very open-cellular structures with the superior performance properties of a poly(propylene oxide) polyol-based foam. | 09-20-2012 |
20130178550 | PROCESS FOR MAKING HIGH AIRFLOW AND LOW COMPRESSION SET VISCOELASTIC POLYURETHANE FOAM - A reaction system comprising (a) a polyisocyanate component and (b) an isocyanate reactive component for preparation of a polyurethane foam having high air flow with low compression set is provided. The isocyanate reactive component comprises (i) from 45 to 70% by weight of one or more PO-rich polyols having a combined number average equivalent weight from 210 to 510, (ii) from 20 to 30% by weight of one or more ethylene oxide polyols having a combined number average equivalent weight from 200 to 500, (iii) from 10 to 25% by weight of one or more ethylene oxide-alkylene oxide polyethers having a combined number average equivalent weight from 300 to 800; and (iv) from 0.5 to 15% by weight of one or more PO-rich polyols having a functionality of 1 to 4 and a combined number average equivalent weight of 2,000 to 6,000. | 07-11-2013 |
20130225706 | PROCESS FOR MAKING LOW COMPRESSION AND HIGH AIRFLOW MDI VISCOELASTIC POLYURETHANE FOAM - A reaction system comprising an organic polyisocyanate and an isocyanate reactive component for preparation of a viscoelastic polyurethane foam is provided. The isocyanate reactive component comprises (i) from 10 to 50% by weight of one or more low equivalent weight propylene oxide rich (PO-rich) polyols having a combined number average equivalent weight from 200 to 500, (ii) from 45 to 95% by weight of one or more ethylene oxide (EO-rich) polyols having a combined number average equivalent weight from 200 to 800 and an ethylene oxide content from 40% to 65% by weight of the total mass of the EO-rich polyol and at least one of (iii) from 10 to 30% by weight of one or more high equivalent weight PO-rich polyols having a number average equivalent weight from 800 to 2,000 or (iv) from 10 to 40% by weight of one or more propylene oxide co-polymer polyols containing styrene-acrylonitrile. | 08-29-2013 |
Patent application number | Description | Published |
20120041741 | Dynamically Adjusting Simulation Fidelity in a Self-Optimized Simulation of a Complex System - Mechanisms are provided for controlling a fidelity of a simulation of a system. A model of the system is received, the model of the system having a plurality of individual components of the system. Fidelity values are assigned to models of the individual components of the system. A required fidelity value is assigned to transactions between components in the plurality of individual components of the system. A simulation of the system is executed using the model of the system and the models of the individual components of the system. The fidelity values of one or more of the models of the individual components of the system are dynamically adjusted during the execution of the simulation based on the required fidelity values assigned to the transactions. | 02-16-2012 |
20120041742 | Dynamically Adjusting Simulation Fidelity Based on Changes in Activity Levels of Components - Mechanisms are provided for controlling a fidelity of a simulation of a system. A model of the system is received, the model of the system having a plurality of individual components of the system. Fidelity values are assigned to models of the individual components of the system. A simulation of the system is executed using the model of the system and the models of the individual components of the system. For each component in the plurality of individual components of the system, an activity level of the component during execution of the simulation is determined. The fidelity values of one or more of the models of the individual components of the system are dynamically adjusted during the execution of the simulation based on changes in individual activity levels of the individual components. | 02-16-2012 |
20120041747 | Dynamically Adjusting Simulation Fidelity Based on Checkpointed Fidelity State - Mechanisms are provided for controlling a fidelity of a simulation of a system. A model of the system is received, the model of the system having a plurality of individual components of the system. Fidelity values are assigned to models of the individual components of the system. A simulation of the system is executed using the model of the system and the models of the individual components of the system. The fidelity values of one or more of the models of the individual components of the system are dynamically adjusted during the execution of the simulation by creating a checkpoint of a state of the simulation and modifying one or more fidelity values of one or more of the models of the individual components after generating the checkpoint, thereby generating a modified fidelity value state. | 02-16-2012 |
20120041749 | Determining Simulation Fidelity in a Self-Optimized Simulation of a Complex System - Mechanisms are provided for controlling a fidelity of a simulation of a computer system. A model of the system is received that has a plurality of components. A representation of the plurality of individual components of the system is generated. A component is assigned to be a fidelity center having a highest possible associated fidelity value. Fidelity values are assigned to each other component in the plurality of individual components based on an affinity of the other component to the fidelity center. The system is simulated based on assigned fidelity values to the components in the plurality of individual components. | 02-16-2012 |
20120041750 | Dynamically Predicting Simulation Fidelity in a Self-Optimized Simulation of a Complex System - Mechanisms are provided for controlling a fidelity of a simulation of a system. A model of the system is received, where the model has a plurality of individual components of the system. Fidelity values are assigned to models of the individual components of the system and a simulation of the system is executed using the model of the system and the models of the individual components of the system. The simulation comprises a plurality of transactions targeting a receiver component. A history of mismatches between a fidelity value associated with the receiver component and required fidelity values of the plurality of transactions targeting the receiver component is maintained. A prediction of a fidelity value to be assigned to the receiver component based on the history of mismatches is performed. A fidelity value of the receiver component is adjusted based on results of predicting the fidelity value to be assigned to the receiver component. | 02-16-2012 |
20130253899 | Determining Simulation Fidelity in a Self-Optimized Simulation of a Complex System - Mechanisms are provided for controlling a fidelity of a simulation of a computer system. A model of the system is received that has a plurality of components. A representation of the plurality of individual components of the system is generated. A component is assigned to be a fidelity center having a highest possible associated fidelity value. Fidelity values are assigned to each other component in the plurality of individual components based on an affinity of the other component to the fidelity center. The system is simulated based on assigned fidelity values to the components in the plurality of individual components. | 09-26-2013 |
Patent application number | Description | Published |
20140098632 | Determining a Confidence Value for a Fracture Plane - Systems, methods, and software can be used to determine a confidence value for a fracture plane. In some aspects, a subset of microseismic events associated with a fracture treatment of a subterranean zone are selected. Confidence in associating the selected subset of microseismic events with a common fracture plane is determined. The confidence can be determined, for example, based on the number of microseismic events in the subset, a location uncertainty for each microseismic event in the subset, a moment magnitude for each microseismic event in the subset, a distance between each microseismic event and a fracture plane fitted to the microseismic events, an orientation of the fracture plane fitted to the microseismic events, or a combination of these and other factors. | 04-10-2014 |
20140098633 | Geometrical Presentation of Fracture Planes - Systems, methods, and software can be used to analyze microseismic data from a fracture treatment. In some aspects, fracture planes are identified based on microseismic event data from a fracture treatment of a subterranean zone. Each fracture plane is associated with a subset of the microseismic event data. Confidence level groups are identified from the fracture planes. Each confidence level group includes fracture planes that have an accuracy confidence value within a respective range. A graphical representation of the fracture planes is generated. The graphical representation includes a distinct plot for each confidence level group. | 04-10-2014 |
20140098638 | Identifying Fracture Planes From Microseismic Data - Systems, methods, and software can be used to identify fracture planes in a subterranean zone. In some aspects, data representing locations of microseismic events associated with a subterranean zone are received. Fracture plane parameters are calculated from the locations of the microseismic events. The fracture plane parameters are calculated based on a sum of weighted terms, and each of the weighted terms includes a weighting factor that decreases with a distance between at least one of the microseismic events and a fracture plane defined by the fracture plane parameters. | 04-10-2014 |
20140098639 | Identifying Dominant Fracture Orientations - Systems, methods, and software can be used to identify properties of fractures in a subterranean zone. In some aspects, a basic plane orientation is determined for each of a plurality of basic planes. The basic planes are defined by coplanar subsets of microseismic event data from a fracture treatment of a subterranean zone. The quantity of the basic plane orientations in each of a plurality of ranges is calculated. In some implementations, a histogram is displayed to indicate the quantity of basic plane orientations in each of the orientation ranges. A dominant fracture orientation is identified for the subterranean zone based on one or more of the identified quantities. | 04-10-2014 |
20140100786 | Analyzing Microseismic Data from a Fracture Treatment - Systems, methods, and software can be used to analyze microseismic data from a fracture treatment. In some aspects, data for a new microseismic event are from a fracture treatment of a subterranean zone. An updated parameter for a fracture plane is calculated. The fracture plane was previously generated based on data for prior microseismic events. The updated parameter calculated is calculated based on the data for the new microseismic event and the data for the prior microseismic events. A graphical representation of the fracture plane is displayed based on the updated parameter. | 04-10-2014 |
20140100833 | ANALYZING FRACTURE STRATIGRAPHY - Systems, methods, and software can be used to calculate fracture stratigraphy of a subterranean zone. In some aspects, microseismic event data associated with a fracture treatment of a subterranean zone are received, and the subterranean zone includes multiple subsurface layers. A filter is used to select a subset of the microseismic event data corresponding to fractures in a particular subsurface layer. Fracture stratigraphy is calculated for the particular subsurface layer from fracture planes associated with the selected subset of the microseismic event data. | 04-10-2014 |
20150055436 | IDENTIFYING OVERLAPPING STIMULATED RESERVOIR VOLUMES FOR A MULTI-STAGE INJECTION TREATMENT - In some aspects, a first boundary is computed based on microseismic event locations associated with a first stage of a multi-stage injection treatment of a subterranean region. A second boundary is computed based on microseismic event locations associated with a second stage of the multi-stage injection treatment. Based on the first and second boundaries, an overlap between stimulated reservoir volumes (SRVs) associated with the first and second stages is determined. | 02-26-2015 |
20150055437 | IDENTIFYING AN AXIS OF A STIMULATED RESERVOIR VOLUME FOR A STIMULATION TREATMENT OF A SUBTERRANEAN REGION - In some aspects, a boundary is computed based on locations of microseismic events associated with a stimulation treatment of a subterranean region. A major axis of a stimulated reservoir volume (SRV) for the stimulation treatment is identified based on the boundary. In some examples, the boundary is an ellipsoid, and the major axis of the ellipsoid is identified. | 02-26-2015 |
20150057933 | INDENTIFYING A STIMULATED RESERVOIR VOLUME FROM MICROSEISMIC DATA - In some aspects, a closed boundary is computed based on locations of microseismic events associated with a stimulation treatment of a subterranean region. Based on the boundary, a stimulated reservoir volume (SRV) for the stimulation treatment is identified. The boundary encloses a first subset of the locations and a second, different subset of the locations reside outside the boundary. | 02-26-2015 |
20150057934 | IDENTIFYING UNCERTAINTY ASSOCIATED WITH A STIMULATED RESERVOIR VOLUME (SRV) CALCULATION - In some aspects, first and second boundaries are computed based on locations of microseismic events associated with a stimulation treatment of a subterranean region. Based on the first and second boundaries, an uncertainty associated with a stimulated reservoir volume (SRV) for the stimulation treatment is identified. The first and second boundaries are defined in a common spatial domain and at least a portion of the second boundary resides outside the first boundary. | 02-26-2015 |
20150057985 | REAL-TIME STIMULATED RESERVOIR VOLUME CALCULATION - In some aspects, data for a new microseismic event associated with a stimulation treatment of a subterranean region is received. A boundary that was previously computed to enclose locations of prior microseismic events associated with the stimulation treatment is identified. The boundary is modified based on the data for the new microseismic event. | 02-26-2015 |
Patent application number | Description | Published |
20090093704 | SYSTEM, PROGRAM PRODUCT, AND METHOD OF ACQUIRING AND PROCESSING MRI DATA FOR SIMULTANEOUS DETERMINATION OF WATER, FAT, AND TRANSVERSE RELAXATION TIME CONSTANTS - A system, program product, and method to determine water, fat, and transverse relaxation time constants in MRI scanning are provided. A method includes initiating readout gradient pulses to collect echo signals with identical phase encoded gradients to thereby produce a plurality of images, instead of a single image with a single readout gradient. A receiver bandwidth used for collecting the echo signals can be determined responsive to an acquisition matrix size along the readout axis and a time duration for water and fat signals to evolve by a preselected phase angle. In a modified FSE implementation, for example, a method includes using readout gradient pulses that use substantially all of the echo spacing time periods between successive refocus RF pulses. By exploiting the phase and the amplitude relationship between the images, the method can include processing the images to generate separate water and fat images, as well as quantitative maps of transverse relaxation time constants. | 04-09-2009 |
20100195885 | METHODS OF EFFICIENT AND IMPROVED PHASE-SENSITIVE MRI - A single-point Dixon (“SPD”) technique that can provide chemical species separation using data from a single echo with a flexible relative phase angle between the species is provided. | 08-05-2010 |
20150161784 | METHOD AND APPARATUS FOR EXTENDED PHASE CORRECTION IN PHASE SENSITIVE MAGNETIC RESONANCE IMAGING - Methods, apparatuses, systems, and software for extended phase correction in phase sensitive Magnetic Resonance Imaging. A magnetic resonance image or images may be loaded into a memory. Two vector images A and B associated with the loaded image or images may be calculated either explicitly or implicitly so that a vector orientation by one of the two vector images at a pixel is substantially determined by a background or error phase at the pixel, and the vector orientation at the pixel by the other vector image is substantially different from that determined by the background or error phase at the pixel. A sequenced region growing phase correction algorithm may be applied to the vector images A and B to construct a new vector image V so that a vector orientation of V at each pixel is substantially determined by the background or error phase at the pixel. A phase corrected magnetic resonance image or images may be generated using the vector image V, and the phase corrected magnetic resonance image or images may be displayed or archived. | 06-11-2015 |
20150316631 | METHODS AND APPARATUS FOR PHASE CORRECTION IN MAGNETIC RESONANCE IMAGING - Methods, apparatuses, systems, and software for extended phase correction in phase sensitive magnetic resonance imaging utilizing an optimized region-growing based phase correction algorithm. Phase correction is formulated as selecting a vector for each pixel of an image from two input candidate vectors so that the orientation of the output vector is spatially smooth. In certain embodiments, the optimized region growing algorithm uses automated quality guidance for determining the sequence of region growing and jointly considers the two input candidate vectors during region growing. Further, the algorithm tracks the quality and the mode at each step of the processing. Spatially isolated tissue regions are automatically segmented and processed with different threads of region growing and the correct vector is reliably identified as the output vector for each thread of region growing. Final phase correction was performed by pixel level optimization. | 11-05-2015 |
Patent application number | Description | Published |
20090019156 | System and Method of Providing Services via a Peer-To-Peer-Based Next Generation Network - A peer-to-peer network comprises a plurality of intelligent terminal nodes, each intelligent terminal node being operable to establish, maintain, and tear-down communication sessions with another intelligent terminal node, a plurality of network service nodes coupled to the plurality of intelligent terminal nodes, the plurality of network service nodes comprise at least one of the plurality of intelligent terminal nodes, at least one user P2P function module operable to store, locate and distribute service resource information related to user policies, and at least one network P2P function module operable to store, locate and distribute service resource information related to operator provider policies, and operable to exert stricter security control than the at least one user P2P function module. | 01-15-2009 |
20100076879 | SYSTEM AND METHOD OF PROVIDING SERVICES VIA PEER-TO-PEER-BASED NEXT GENERATION NETWORK - A peer-to-peer network comprises a plurality of intelligent terminal nodes, each intelligent terminal node being operable to establish, maintain, and tear-down communication sessions with another intelligent terminal node, a plurality of network service nodes coupled to the plurality of intelligent terminal nodes, the plurality of network service nodes comprise at least one of the plurality of intelligent terminal nodes, at least one user P2P function module operable to store, locate and distribute service resource information related to user policies, and at least one network P2P function module operable to store, locate and distribute service resource information related to operator provider policies, and operable to exert stricter security control than the at least one user P2P function module. | 03-25-2010 |
20110113480 | CARRIER-GRADE PEER-TO-PEER (P2P) NETWORK, SYSTEM AND METHOD - A computing network, including: a plurality of peer computing devices including code, which when executed by a peer computing device causes the executing peer computing device to cooperate with at least one other of the peer computing devices; at least one server including code, which when executed by the at least one server locates at least one of the peer computing devices; and at least one mediator including code, which when executed by the at least on mediator collects information from at least some of the peer computing devices; wherein, the peer computing devices, at least one sever and at least one mediator are communicatively coupled via an at least carrier-grade telecommunications network being suitable for enhancing co-operation among the cooperating ones of the peer computing devices relative to best-efforts communications among the cooperating ones of the peer computing devices. | 05-12-2011 |
Patent application number | Description | Published |
20090061945 | Sunlight illuminated and sunlight readable mobile phone - The present invention relates to a mobile phone device, more specifically, to a sunlight illuminated and sunlight readable mobile phone device. The display panel opens a transparent window to the ambient light, which allows the sunlight to illuminate the display in both indoor and outdoor applications. A light collecting panel is introduced to reflect or transform the external light with a suitable angle relative to the display panel. A mobile phone with sufficient high contrast ratio, superior readability and ultra wide color gamut has been achieved. The solar light can be utilized as the lighting source in both indoor and outdoor display modes, thus remarkably reduces the power consumption and substantially prolongs the operation time of the rechargeable battery. | 03-05-2009 |
20120120350 | Single layer high brightness full color reflective cholesteric displays - The present invention relates to a liquid crystal display, more specifically, to a single layer reflective full color cholesteric display employing full spectrum circularly polarization. The display has not only zero-field long time memory but also paper-like super high brightness and contrast. | 05-17-2012 |
20120229718 | Direct-view adjustable lenticular 3D device and manufacturing process - The preset invention relates to a three-dimensional LCD, and more specifically to a rigid lenticular three dimensional LCD with an air layer and spacer structure which allows realignment and readjustment of the coordination of the lenticular film relative to the display panel so that the 3D effect can be micro-controllable when it is needed to display 3D video images and moving pictures. | 09-13-2012 |
20140043565 | SUNLIGHT READABLE LCD DEVICES EMPLOYING DIRECTIONAL LIGHT GUIDING FILM - The current invention relates to a sunlight readable full color active matrix liquid crystal display devices. By means of a novel Directional Light Guiding (DLG) film structure, both the internal backlight and the external sunlight can be used synergistically for lighting the display so as to deliver superior readability and color quality. A seamless transition between indoor and outdoor applications makes the vivid true color display an ideal solution to portable electronics. | 02-13-2014 |
Patent application number | Description | Published |
20090051315 | System and Method for Information Handling System Battery Charge Protection and Fault Alarm - An information handling system battery has first and second protective circuits to detect and address faults for a first charge applied from an external power source to an integrated charger and a second charge applied from a charger of an information handling system to battery cells. If the first protective circuit detects a fault associated with the integrated charger, charging of the battery cells is still supported by inserting the battery in an information handling system. If the second protective circuit detects a fault, the battery becomes inoperative by disconnecting the battery cells. An indicator, such as LEDs on the battery casing, indicates whether a soft or hard fault has occurred. | 02-26-2009 |
20090251406 | System and Method for Selective Activation and Deactivation of an Information Handling System Input Output Device - An information handling system has a chassis and a lid, the lid rotating between a closed position and a tablet position. An indicator coupled to the lid, such as a magnet, aligns with a first detector coupled to a chassis of the information handling system, such as a Hall effect detector, in the tablet position so that the detector signals to a position detector module to disable a keyboard of the information handling system. The indicator aligns with a second detector coupled to the chassis in a closed configuration so that the second detector signals to the position detector module to enter a power down state. | 10-08-2009 |
20140035515 | System and Method for Information Handling System Battery Charge Protection and Fault Alarm - An information handling system battery has first and second protective circuits to detect and address faults for a first charge applied from an external power source to an integrated charger and a second charge applied from a charger of an information handling system to battery cells. If the first protective circuit detects a fault associated with the integrated charger, charging of the battery cells is still supported by inserting the battery in an information handling system. If the second protective circuit detects a fault, the battery becomes inoperative by disconnecting the battery cells. An indicator, such as LEDs on the battery casing, indicates whether a soft or hard fault has occurred. | 02-06-2014 |
Patent application number | Description | Published |
20120320972 | APPARATUS AND METHOD FOR LOW-COMPLEXITY OPTIMAL TRANSFORM SELECTION - A video processing system includes prediction primary transforms, quantization, entropy coding and filtering configured to receive and compress video information and output compressed video information corresponding to the received video information. The compressed video information comprising prediction mode, transform block size, quantization parameter, and filtering type. The video processing system also includes a secondary transform configured to receive and compress the compressed video information. The video processing system also includes a quantization stage configured to receive and compress the transformed coefficients. The video processing system also includes an entropy coding stage configured to convert the compressed video information into binary bits. The video processing system also includes a filtering stage configured to improve the reconstructed video information for better prediction. | 12-20-2012 |
20130064417 | APPARATUS AND METHOD FOR ROBUST LOW-COMPLEXITY VIDEO FINGERPRINTING - An apparatus and method for video fingerprinting are provided. The method includes, for each frame of a video sequence including a plurality of frames, removing a portion of the frame, dividing a remaining portion of the frame into blocks, dividing each block into sub-blocks, computing a block level feature as a mean of pixels in each sub-block within the block, concatenating all block level features in the frame, and concatenating features of all frames in the video sequence. | 03-14-2013 |
20130278642 | PERCEPTUAL LOSSLESS DISPLAY POWER REDUCTION - Segments for a video are transmitted in payload units with an extended network abstraction layer unit (NALU) header or supplemental enhancement information (SEI) message within which is embedded display adaptation information that may be employed to control display brightness and thereby reduce power consumption during display of the respective segment. The display adaptation information includes at least a maximum pixel brightness that may be used to scale pixel brightness and correspondingly reduce backlighting for liquid crystal displays, or to adjust the supply voltage for OLED displays. The maximum pixel brightness is set to a level saturating a portion of the pixel histogram without perceptual loss to the viewer, resulting in further reduction of power consumption. | 10-24-2013 |
20130278834 | DISPLAY POWER REDUCTION USING EXTENDED NAL UNIT HEADER INFORMATION - Segments for a video are transmitted in payload units with an extended network abstraction layer unit (NALU) header within which is embedded display adaptation information that may be employed to control display brightness and thereby reduce power consumption during display of the respective segment. The display adaptation information includes at least a maximum pixel brightness that may be used to scale pixel brightness to maximum and correspondingly reduce backlighting for liquid crystal displays, or to adjust the supply voltage for OLED displays. The display adaptation information may optionally include a minimum pixel brightness, a pixel histogram step size, and an indicator of scaling method. | 10-24-2013 |
20140136727 | METHOD AND SYSTEM FOR COMPLEXITY ADAPTIVE STREAMING - A method includes calculating a complexity value for each segment or version of multimedia content. The multimedia content has multiple versions associated with common content and different encoding parameters, and each version is divided into segments. The method also includes adaptively streaming the multimedia content to a client device based on at least some of the calculated complexity values. The complexity value for each segment or version is calculated by summing multiple operation complexity values defining complexities of operations for decoding the segment or version. The operation complexity values could include values for a bit parsing operation, a buffer initialization operation, an intra-prediction operation, an inverse quantization and transform operation, a reference block fetch operation, a fractional interpolation operation, and in-loop deblocking operation, a sample adaptive offset correction operation, an adaptive loop filtering operation, and a de-ringing filtering operation. | 05-15-2014 |
20140253601 | DISPLAY POWER REDUCTION USING SEI INFORMATION - Segments for a video are transmitted in payload units with a supplemental enhancement information (SEI) message within which is embedded display adaptation information that may be employed to control display brightness and thereby reduce power consumption during display of the respective segment. The display adaptation information includes at least a maximum pixel brightness that may be used to scale pixel brightness to maximum and correspondingly reduce backlighting for liquid crystal displays, or to adjust the supply voltage for OLED displays. The display adaptation information may optionally include a minimum pixel brightness, a pixel histogram step size, and an indicator of scaling method. | 09-11-2014 |