Patent application number | Description | Published |
20140272535 | THREE-REGION BATTERY SEPARATOR - Disclosed is a battery separator, comprising a coarse fiber region comprising fibers, such as glass fibers, having an average diameter of greater than or equal to 2 μm; a first fine fiber region comprising glass fibers having an average diameter of less than or equal to 2 μm, and a second fine fiber region comprising glass fibers having an average diameter of less than or equal to 2 μm, wherein the coarse fiber region is disposed between the first fine fiber region and the second fine fiber region, and wherein the thickness of the coarse fiber region constitutes 1-49% of the sum of the thicknesses of the coarse fiber region, the first fine fiber region and the second fine fiber region. Such a separator is useful, e.g., in a lead-acid battery, where during filling of the battery with acid, the separator enhances the diffusion of acid toward the interior region. | 09-18-2014 |
20160079581 | Multi-Region Battery Separators - Disclosed is a battery separator, comprising two fiber regions comprising glass fibers, and a middle fiber region disposed between them comprising larger average diameter fibers and specified amounts of silica, or fine fibers, or both; and processes for making the separator. Also disclosed is a battery separator, comprising a fiber region and either one or two silica-containing region(s) adjacent thereto, each of the regions containing a specified amount of silica; and processes for making the separator. Such separators are useful, e.g., in lead-acid batteries. | 03-17-2016 |
Patent application number | Description | Published |
20110160882 | SYSTEM AND METHOD FOR PROVIDING IMMERSIVE SURROUND ENVIRONMENT FOR ENHANCED CONTENT EXPERIENCE - A method and system for providing an immersive surround environment for enhanced content experience is provided. The method includes receiving an encoded media stream and processing the stream to obtain decoded media data. The received media stream can also be captured real-time media. The method further includes extracting one or more environmental parameters from the stream. The environmental parameters are then embedded or encoded. Thereafter, the method includes providing the one or more environmental parameters to one or more devices that control environmental conditions to produce environmental effects. | 06-30-2011 |
20120257876 | METHOD AND SYSTEM FOR GENERATING AT LEAST ONE OF: COMIC STRIPS AND STORYBOARDS FROM VIDEOS - A method, a system, and a computer program product code for generating a series of still images from an input video file are provided. The series of still images may include, but are not limited to, a comic strip and a storyboard. The method includes extracting audio and visual frames from the video file. Thereafter, basic units of the video file are identified. The basic units are exposition (beginning), conflict (middle), and resolution (end). Thereafter, key frames are extracted from the basic units based on at least one of audio frames, visual frames, and a combination of the visual frames and the audio frames. Then, the extracted key frames are manipulated to output a series of still images. Subsequently, narration in the form of audio or text is attached to the still images to generate at least one of comic strips and storyboards. | 10-11-2012 |
20120258736 | METHOD, SYSTEM, AND COMPUTER-READABLE MEDIUM FOR PROVIDING LOCATION-BASED LISTING SERVICES - The present invention relates to a computer-implemented method, system and computer readable medium for providing context-based listing services. The method comprises registering at least one first service provider with an second service provider wherein registering comprises that the first service provider provides the information via a communication network to the second service provider and it validates the information. Validating comprises identify the location of the first service provider and/or request to at least one predefined user located nearby the location of the first service provider. At least one user requests the second service provider for the information via the communication network. At least one user retrieves the information and provides ranking to category of services so as to update the information in the second service provider. | 10-11-2012 |
20120259974 | SYSTEM AND METHOD FOR DYNAMIC MODIFICATION OF WEB PAGE CONTENT TO ENSURE CONSISTENT RESPONSE TIME - Dynamic modification of web page content is necessary especially when the delivery time has to be consistent. The present disclosure describes dynamic modification of web page content. The method for dynamic modification of web page comprises computing a required time by a middleware by considering a plurality of system constraints. Further, an available time is computed by the middleware for a data response by using one or both of the plurality of the system constraints and a target time. Determining an amount of the data response to be provided to a client based on the available time and converting the data response based on the amount of data response to be provided to the client. | 10-11-2012 |
20130007198 | METHODS FOR RECOMMENDING PERSONALIZED CONTENT BASED ON PROFILE AND CONTEXT INFORMATION AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that identifies profile information for a received request associated with an end user at a requesting computing device and context information associated with the requesting computing device. Customized content responsive to the received request is obtained from a content provider device based on the identified profile information and the identified context information. The obtained customized content is providing to the requesting computing device. | 01-03-2013 |
20130036194 | METHODS FOR OPTIMIZING HOW CONTENT IS PROVIDED AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that obtains with a content management computing device application configuration information about an executing application on an end user computing device that provides content to a primary end user. Sensor data is obtained with the content management computing device from one or more sensor devices. A type of device for the end user computing device executing the application is identified. One or more personalized values are determined with the content management computing device based on the obtained sensor data, the identified type of device, and the obtained application configuration information. The determined one or more personalized values are provided by the content management computing device to the end user computing device to optimize the content provided to the primary end user by the executing application. | 02-07-2013 |
20130061330 | METHOD AND SYSTEM FOR CONFIGURING CONSTRAINTS FOR A RESOURCE IN AN ELECTRONIC DEVICE - The present invention provides a method and system for configuring constraints for a resource in an electronic device. The method includes identifying context of use/access of a resource and implementing permissions/constraints as per the identified context. The method includes identifying an existing work environment of a resource by capturing information through an application program interface (API), identifying constraints for the resource with respect to the identified work environment from a constraint specification file for the resource which contains constraint details for all work environments, and either configuring the identified constraints for the resource, or modifying the identified work environment for the resource and configuring corresponding constraints for the resource. | 03-07-2013 |
20130067239 | FRAMEWORK AND METHOD FOR SECURE DATA MANAGEMENT IN A DIVERSIFIED PLATFORM - The disclosure provides a method and a framework for secure data management, in which the method comprises: enabling, by an enterprise server, a user to download an enterprise application from the enterprise server using a computing device. User authentication credentials are provided by the enterprise server to a user when the user registers with the enterprise server. A unique client ID is assigned for the enterprise application downloaded by the computing device by the enterprise server. Keys for data encryption or decryption are generated by the enterprise server, for different services provided by the enterprise server based on a combination of the unique client ID, a user ID and/or a computing device ID. | 03-14-2013 |
20130103790 | SYSTEM AND METHOD FOR PROVIDING ONE OR MORE UPDATED FILES FOR A GENERATED USER PERSONALIZED SOFTWARE APPLICATION - In an aspect, a system, non-transitory machine readable medium and method for updating at least a portion of a previously transmitted personalized software application is disclosed. A request is received from a user's client device to obtain one or more updated files associated with a previously transmitted personalized software application which includes a customized executable file having core library file(s) and configuration file(s). The user and client device profile information is retrieved from a user database to identify the core library and the one or more configuration files that were included in the previously transmitted executable file. A file database is accessed and at least one updated file is selected corresponding to a previous version file included in the previously transmitted executable file. The updated file(s) is sent to the client device which is then implemented by the client device to operate the updated version of the software application. | 04-25-2013 |
20130104113 | SYSTEM AND METHOD FOR DYNAMICALLY GENERATING A USER PERSONALIZED DOWNLOADABLE EXECUTABLE FILE - In an aspect, a system, non-transitory machine readable medium and method for providing a personalized executable file to a client device is disclosed. A request sent from a client device to obtain a software application is received. The request is processed to identify the client device and a user associated with the client device. The client device profile information associated with the identified client device as well as user profile information associated with the identified user is determined. One or more configuration/core library files are selected from a file database based on the user profile information and the client device profile information. A personalized executable file is generated for the requested software application, wherein the personalized executable file comprises selected core library files and the selected configuration files. The personalized executable file of the requested software application is then sent to the client device. | 04-25-2013 |
20130117423 | METHODS FOR MANAGING DATA SYNCHRONIZATION AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that manage data synchronization include obtaining one or more configuration rules and at least one value for one or more configuration parameters. One or more synchronization rules are generated based on the obtained one or more configuration rules and the one or more configuration parameters. Each of the one or more generated synchronization rules are compared to a corresponding synchronization rule in an existing configuration profile. The existing configuration profile is updated based on the results of the comparison. The updated configuration profile is communicated to a client computing device. | 05-09-2013 |
20130117438 | METHODS FOR ADAPTING APPLICATION SERVICES BASED ON CURRENT SERVER USAGE AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that monitor one or more capacity related factors of one or more servers providing one or more services to one or more client computing devices to obtain one or more values. An adaption factor for at least one of the one or more client computing devices is determined based on the one or more obtained values for the one or more monitored capacity related factors and one or more adaption rules. The adaption factor may further be determined based on obtained user profile information. The determined adaption factor to adapt operation of the one or more provided services at the at least one of the one or more client computing devices is provided. | 05-09-2013 |
20130227661 | SYSTEMS AND METHODS FOR GENERATING AND AUTHENTICATING ONE TIME DYNAMIC PASSWORD BASED ON CONTEXT INFORMATION - The invention relates to a system and method for generating and authenticating one time dynamic password based on the context information related to a user. It involves retrieving user context information and generating a dynamic value based on that. The first one time dynamic password is generated at the user device using the first dynamic value and the user PIN. The first dynamic value along with the user identifier is sent to the authentication server. The authentication server sends the user identifier to the context management server. The context management server has access the context information used to generate the first dynamic value and based on that they generate a second dynamic value. The authentication server receives this value and generates the second one time dynamic password and if it matches with the first one time dynamic password then the authentication server authenticates the first one time dynamic password. | 08-29-2013 |
Patent application number | Description | Published |
20130024766 | SYSTEM AND METHOD OF CONTEXT AWARE ADAPTION OF CONTENT FOR A MOBILE DEVICE - The invention relates to a system and method of context aware adaption of content for a mobile device. This involves identifying context parameters and associated values, selection of content layout based on context parameters. Content layout is selected from pre-configured content layouts based on context parameters. The content is retrieved from a content store. Content style is selected from pre-configured content styles based on context parameters. Rendering content on the device display based on the selected content layout, content style and at least one context parameter. | 01-24-2013 |
20130024773 | SYSTEM AND METHOD FOR SUMMARIZING INTERACTIONS - The disclosed embodiment relates to methods for presenting information to a user in a concise manner. The method preferably comprises receiving information specifying at least one data characteristic and at least one presentation characteristic, wherein the at least one data characteristic relates to information desired by a user regarding data and the at least one presentation characteristic relates to the manner in which information is presented to the user, receiving a collection of data, identifying relevant data from the collection of data based on at least one of the data characteristics, condensing the relevant data into presentation data based on at least one of the presentation characteristics, and presenting the presentation data. The disclosed embodiment also relates to a system and computer-readable code that can be used to implement the exemplary methods. | 01-24-2013 |
20150156175 | METHODS FOR SECURING A COMMUNICATION TO A SOCIAL MEDIA APPLICATION AND DEVICES THEREOF - The present invention provides a method and system for securing communication of data to a social media application. A set of network routing parameters are configured for the communication. An encrypted response containing a sensitive data is routed from a secure entity to the social media application through a middleware. The encrypted response is intercepted by a decrypting entity based on the configured set of network routing parameters. The encrypted response is decrypted by the decrypting entity and the sensitive data is retrieved. The sensitive data is transmitted by the decrypting entity to the social media application. | 06-04-2015 |
Patent application number | Description | Published |
20090316774 | METHOD AND APPARATUS FOR MULTI-PART INTERACTIVE COMPRESSION - In order to increase the compression of data being transmitted between two devices in communication, the data may be broken up into individual components and individually compressed using different compression state information. The method of multi-part interactive compression comprises the steps of retrieving a request for data from a communicating party; retrieving the data; parsing the data into components according to the content of the data; and compressing each of the components using compression state information. | 12-24-2009 |
20100049850 | BROWSER-PLUGIN BASED METHOD FOR ADVANCED HTTPS DATA PROCESSING - The invention described here deals with implementing custom data processing of HTTPS based on a Browser-Plugin Method. Such custom data processing may include, but is not limited to, custom data compression, custom data encryption, data monitoring, data modification. There are two distinct methods to implement the Browser-Plugin Method for Advanced HTTPS Data Processing of the subject invention (BPAHDP). In both cases, BPAHDP provides the option of conducting custom data processing that co-exists with data compression, data encryption, or other types of data processing operations supported by the HTTP standard. Additionally, both BPAHDP methods ensure that the web-browser still implements and executes the underlying SSL/TLS channel setup and encryption operations. In both embodiments of BPAHDP, the most critical functionality is the ability to modify HTTP request/response headers and data sent over a TLS/SSL channel. In the regular HTTP case (HTTP over TCP) headers and data are sent as clear-text (i.e., as unencrypted data). Therefore, any HTTP proxy component can intercept and modify header/data as it chooses—allowing custom data processing operations (including a custom compression operation) to be implemented. For HTTPS traffic, the data leaving a web-browser is encrypted. Therefore, a proxy cannot modify encrypted data, hence the novelty of the BPAHDP methodology. Both methods require specific implementation methods that are described. In particular, both embodiments of BPAHDP require specific techniques to facilitate the use of Microsoft Internet Explorer as a BPAHDP enabled web-browser. Microsoft COM (Component Object Model) interfaces and IE's Pluggable Protocol capabilities are utilized to meet all requirements of both BPAHDP embodiments. | 02-25-2010 |
Patent application number | Description | Published |
20130055264 | SYSTEM AND METHOD FOR PARAMETERIZING DOCUMENTS FOR AUTOMATIC WORKFLOW GENERATION - One embodiment of the present invention sets forth a method for generating a new workflow for an application. The method includes generating a parameter tree related to a current workflow, wherein the parameter tree includes a different node corresponding to each parameter included in one or more documents associated with the current workflow, modifying a value associated with a first node included in the parameter tree based on an input, wherein the first node corresponds to a first parameter included in a first document associated with the current workflow, evaluating a second document associated with the current workflow based on the modified value associated with the first node, and generating the new workflow based on the evaluated second document. | 02-28-2013 |
20140237354 | SYSTEM AND METHOD FOR PARAMETERIZING DOCUMENTS FOR AUTOMATIC WORKFLOW GENERATION - One embodiment of the present invention sets forth a method for generating a new workflow for an application. The method includes generating a parameter tree related to a current workflow, wherein the parameter tree includes a different node corresponding to each parameter included in one or more documents associated with the current workflow, modifying a value associated with a first node included in the parameter tree based on an input, wherein the first node corresponds to a first parameter included in a first document associated with the current workflow, evaluating a second document associated with the current workflow based on the modified value associated with the first node, and generating the new workflow based on the evaluated second document. | 08-21-2014 |
20150254220 | SYSTEM AND METHOD FOR PARAMETERIZING DOCUMENTS FOR AUTOMATIC WORKFLOW GENERATION - One embodiment of the present invention sets forth a method for generating a new workflow for an application. The method includes generating a parameter tree related to a current workflow, wherein the parameter tree includes a different node corresponding to each parameter included in one or more documents associated with the current workflow, modifying a value associated with a first node included in the parameter tree based on an input, wherein the first node corresponds to a first parameter included in a first document associated with the current workflow, evaluating a second document associated with the current workflow based on the modified value associated with the first node, and generating the new workflow based on the evaluated second document. | 09-10-2015 |
Patent application number | Description | Published |
20090238772 | METHODS AND COMPOSITIONS FOR PREVENTION OR TREATMENT OF RSV INFECTION - Methods and compositions are provided for the prevention or treatment of RSV infection in a human. The methods include administering one or more doses of a composition comprising an siRNA. The dose can be formulated for topical or parenteral administration. Topical administration includes administration as a nasal spray, or by inhalation of respirable particles or droplets. The siRNA comprises a sense strand of ALN-RSV01 and an antisense strand of ALN-RSV01. | 09-24-2009 |
20120189555 | METHODS AND COMPOSITIONS FOR PREVENTION OR TREATMENT OF RSV INFECTION - Methods and compositions are provided for the prevention or treatment of RSV infection in a human. The methods include administering one or more doses of a composition comprising an siRNA. The dose can be formulated for topical or parenteral administration. Topical administration includes administration as a nasal spray, or by inhalation of respirable particles or droplets. The siRNA comprises a sense strand of ALN-RSV01 and an antisense strand of ALN-RSV01. | 07-26-2012 |
20120282341 | Lipid Formulated Compositions And Methods For Inhibiting Expression Of Eg5 And VEGF Genes - This invention relates to compositions containing double-stranded ribonucleic acid (dsRNA) in a SNALP formulation, methods of using the compositions to inhibit the expression of the Eg5/KSP and VEGF, and methods of using the compositions to treat pathological processes mediated by Eg5/KSP and VEGF expression, such as cancer. | 11-08-2012 |
20130165499 | Methods And Compositions For Prevention Or Treatment Of RSV Infection - Methods and compositions are provided for the prevention or treatment of RSV infection in a human. The methods include administering one or more doses of a composition comprising an siRNA. The dose can be formulated for topical or parenteral administration. Topical administration includes administration as a nasal spray, or by inhalation of respirable particles or droplets. | 06-27-2013 |
20140336243 | Lipid Formulated Compositions and Methods for Inhibiting Expression of Eg5 and VEGF Genes - This invention relates to compositions containing double-stranded ribonucleic acid (dsRNA) in a SNALP formulation, methods of using the compositions to inhibit the expression of the Eg5/KSP and VEGF, and methods of using the compositions to treat pathological processes mediated by Eg5/KSP and VEGF expression, such as cancer. | 11-13-2014 |
Patent application number | Description | Published |
20080243731 | GENERALIZED SEQUENTIAL MINIMAL OPTIMIZATION FOR SVM+ COMPUTATIONS - A system and method for support vector machine plus (SVM+) computations include selecting a set of indexes for a target function to create a quadratic function depending on a number of variables, and reducing the number of variables to two in the quadratic function using linear constraints. An extreme point is computed for the quadratic function in closed form. A two-dimensional set is defined where the indexes determine whether a data point is in the two-dimensional set or not. A determination is made of whether the extreme point belongs to the two-dimensional set. If the extreme point belongs to the two-dimensional set, the extreme point defines a maximum and defines a new set of parameters for a next iteration. Otherwise, the quadratic function is restricted on at least one boundary of the two-dimensional set to create a one-dimensional quadratic function. The steps are repeated until the maximum is determined. | 10-02-2008 |
20090204555 | SYSTEM AND METHOD USING HIDDEN INFORMATION - A method and system for use in describing a phenomenon of interest. The method and system computes a decision rule for use in describing the phenomenon of interest using training data relating to the phenomenon of interest, labels for labeling the training data, and hidden information about the training data or directed distances obtained from the hidden information, as inputs. | 08-13-2009 |
20120020216 | COGNITIVE NETWORK LOAD PREDICTION METHOD AND APPARATUS - Loads for a wireless network having a plurality of end nodes are predicted by constructing a computer data set of end-to-end pairs of the end nodes included in the network using a computer model of the network; constructing a computerized set of observables from social information about users of the network; developing a computerized learned model of predicted traffic using at least the data set and the observables; and using the computerized learned model to predict future end-to-end network traffic. | 01-26-2012 |
20120023062 | ROBUST INFORMATION FUSION METHODS FOR DECISION MAKING FOR MULTISOURCE DATA - Methods and systems are provided for developing decision information relating to a single system based on data received from a plurality of sensors. The method includes receiving first data from a first sensor that defines first information of a first type that is related to a system, receiving second data from a second sensor that defines second information of a second type that is related to said system, wherein the first type is different from the second type, generating a first decision model, a second decision model, and a third decision model, determining whether data is available from only the first sensor, only the second sensor, or both the first and second sensors, and selecting based on the determination of availability an additional model to apply the available data, wherein the additional model is selected from a plurality of additional decision models including the third decision model. | 01-26-2012 |
20120209796 | ATTENTION FOCUSING MODEL FOR NEXTING BASED ON LEARNING AND REASONING - A system and method for nexting is presented. The method comprises computing an expected event, observing a new event, when the expected event matches the new event, processing the new event and performing action in accordance with given concepts, when the expected event does not match the new event and the new event can be explained based on the given concepts, processing the new event and performing action in accordance with the given concepts, and when the expected event does not match the new event and the new event cannot be explained based on the given concepts, employing learning mechanism and performing action decided on by the learning mechanism. In one aspect, the method comprises generating new concepts using reasoning or learning. In one aspect, the method comprises converting sensed numerical data into events of interest via the application of learned functions operating on the numerical data. | 08-16-2012 |
20130124452 | MODEL-THEORETIC APPROACH TO DATA ANONYMITY AND INFERENCE CONTROL - A system and method for secure data management is presented. The method comprises receiving a query, performing the query and obtaining answers to it, creating certain formulas representing the answers; and determining whether there is a minimum number of distinct models of these formulas conjoined with the relevant anonymity predicates along with previous answers and general background knowledge, and when that number of models does not exist, suppressing the answers. In one aspect, the method further comprises creating formulas encoding the information conveyed by the answer; and combining the formulas encoding the information with prior information. | 05-16-2013 |
20130218817 | ACTIVE ACQUISITION OF PRIVILEGED INFORMATION - A method for active learning using privileged information is disclosed. A processing device receives a set of labeled examples and a set of unlabeled examples. For each unlabeled example in the set of unlabeled examples, the processing device determines whether to query at least one of an oracle to obtain a label for the unlabeled example or a teacher to obtain privileged information about the unlabeled example. The processing device outputs a decision rule based on minimizing a number of queries to the oracle for a label and the teacher for privileged information. Minimizing the number of queries to the teacher and the oracle is based on a cost of querying the teacher or the oracle. | 08-22-2013 |
20140020066 | SYSTEM AND METHOD FOR SPAMMER HOST DETECTION FROM NETWORK FLOW DATA PROFILES - A system and method for spammer host detection from network flow data profiles comprises constructing one or more cluster profiles and detecting spammer hosts. Construction cluster profiles comprises observing network flow data from one or more hosts; for each host, representing the network flow data associated with the host as a multidimensional vector; clustering the vectors of the hosts into the plurality of cluster profiles; annotating each cluster profile using at least one of black lists and white lists; and calculating a confidence in each cluster profile annotation. Detecting spammer hosts comprises observing the network flow data from a new host; representing the network flow data associated with the new host as a multidimensional vector, and placing the new multidimensional vector of the new host into one cluster profile of the one or more cluster profiles. | 01-16-2014 |
20140082730 | SYSTEM AND METHOD FOR CORRELATING HISTORICAL ATTACKS WITH DIVERSE INDICATORS TO GENERATE INDICATOR PROFILES FOR DETECTING AND PREDICTING FUTURE NETWORK ATTACKS - An apparatus and method predict and detect network attacks by using a diverse set of indicators to measure aspects of the traffic and by encoding traffic characteristics using these indicators of potential attacks or anomalous behavior. The set of indicators is analyzed by supervised learning to automatically learn a decision rule which examines the temporal patterns in the coded values of the set of indicators to accurately detect and predict network attacks. The rules automatically evolve in response to new attacks as the system updates its rules periodically by analyzing new data and feedback signals about attacks associated with that data. To assist human operators, the system also provides human interpretable explanations of detection and prediction rules by pointing to indicators whose values contribute to a decision that there is an existing network attack or an imminent network attack. When such indictors are detected, an operator can take remediation actions. | 03-20-2014 |
20140355454 | Communication Node Operable to Estimate Faults in an Ad Hoc Network and Method of Performing the Same - A communication node operable to estimate faults in a mobile ad hoc network and method of performing the same. In one embodiment, the communication node includes a processor and memory including computer program code configured to, with the processor, cause the communication node to monitor a set of observable parameters at the communication node, produce a fault estimate at the communication node from the set of observable parameters, and provide the fault estimate to a global fault detector at another communication node. | 12-04-2014 |