Patent application number | Description | Published |
20100070902 | Method and System for Controlling Physical Components Via A Virtual Environment - A computer readable storage medium storing a set of instructions that are executable by a processor, the set of instructions being operable to store a virtual representation of a plurality of physical components, display the virtual representation, receive user interaction with at least one of the virtual representations and send a command to the physical component corresponding to the user interaction. | 03-18-2010 |
20100162378 | METHODS AND APPARATUS TO ENHANCE SECURITY IN RESIDENTIAL NETWORKS - Example methods and apparatus to enhance security in residential networks and residential gateways are disclosed. A disclosed example apparatus includes a transceiver to receive an Internet protocol (IP) packet, a first packet processing module associated with a protected IP address, the first packet processing module to be communicatively coupled to a first network device, a second packet processing module associated with a public IP address, the second packet processing module to be communicatively coupled to a second network device, and a packet diverter to route the received IP packet to the first packet processing module when the IP packet contains the protected IP address and to route the IP packet to the second packet processing module when the IP packet does not contain the protected IP address. | 06-24-2010 |
20110131650 | METHODS, DEVICES, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR EDGE DRIVEN COMMUNICATIONS NETWORK SECURITY MONITORING - An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed. | 06-02-2011 |
20110137557 | CELLULAR-BASED LIVE TRAFFIC SERVICE - A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices. | 06-09-2011 |
20110191580 | METHOD AND SYSTEM FOR EXECUTION MONITOR-BASED TRUSTED COMPUTING - A system and method to ensure trustworthiness of a remote service provided by a service provider. The method includes monitoring runtime dependencies invoked during execution of a service transaction associated with the remote service, the service transaction being requested by a service requester. The method further includes determining whether a deviation exists between the runtime dependencies and a trusted list of dependencies associated with the remote service. The method also includes blocking execution of the service transaction based on determining that the deviation between the runtime dependencies and the trusted list of dependencies exists. | 08-04-2011 |
20110305147 | METHOD, NETWORK, AND COMPUTER PRODUCT FOR FLOW BASED QUALITY OF SERVICE - A method, network, and computer program product are provided for traffic flow quality of service. A quality of service priority table is received for services defined by a user at the network, and the quality of service priority table includes quality of service levels for the services. Traffic flows are determined to correspond to packets being communicated over the network for the user. The traffic flows are mapped to services. The traffic flows are mapped to the quality of service levels for the services. The quality of service levels are assigned to the traffic flows as assigned quality of service levels corresponding to the services. Each of the traffic flows is routed over the network according to its assigned quality of service levels, respectively. | 12-15-2011 |
20120023550 | Method and System for Policy Enforcement in Trusted Ad Hoc Networks - A non-transitory computer-readable storage medium storing a set of instructions executable by a processor. The set of instructions is operable to receive a request from a node to join a trusted ad hoc network. The set of instructions is further operable to authenticate the node to join the trusted ad hoc network. The authentication is performed based on a verification that the node will comply with a security policy of the trusted ad hoc network. The set of instructions is further operable to send, to the node, a verification that the trusted ad hoc network complies with the security policy. The set of instructions is further operable to add the node to the trusted ad hoc network. | 01-26-2012 |
20120072605 | System and Method to Detect and Mitigate Distributed Denial of Service Attacks using Random Internet Protocol Hopping - A method includes sending a first redirect instruction to a first client in response to a first session request received at a service address, and establishing a first session with the first client in response to a second session request received at the first redirect address indicated by the first redirect instruction. Additionally, the method includes determining a first service interval has passed, and sending a second redirect instruction to a second client in response to a third session request received at the service address after the first service interval has passed. The method still further includes establishing a second session with the second client in response to the fourth session request received at the second redirect address indicated by the second redirect instruction after the first service interval has passed, and rejecting the fifth session request received from a third client at the first redirect address after the first service interval has passed. | 03-22-2012 |
20120147753 | METHOD AND SYSTEM FOR DYNAMIC TRAFFIC PRIORITIZATION - A method provides for the dynamic traffic prioritization in a communication network. The method electronically monitors traffic in a communication network and determines when traffic exceeds configured thresholds on the links of the communication network. Thus, the method determines a link which is potentially about to be congested in the communication network. The method categorizes the traffic on this link by an end system attached to one end of the potentially congested link into a plurality of priority categories using application layer parameters. Using a re-direct capability of the end system, the method re-directs at least one of the pluralities of priority categories of traffic to an alternate Internet Protocol address. The method uses preconfigured Quality of Service mechanisms on the provider edge router attached to the other end of the potentially congested link to guarantee a predetermined amount of bandwidth capacity of the link to traffic destined to the alternate Internet Protocol address. | 06-14-2012 |
20120151587 | Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation - Devices, systems, and methods are disclosed which leverage an agent that resides in a mobile communication device to detect Proximity based Mobile Malware Propagation (PMMP). The agent injects one or several trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices. However, the triggers connect to an agent server on a service provider's network. Essentially, the method is based on the assumption that malware lacks the intelligence to differentiate the trigger network connection from a normal one. Therefore, by attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, and such attacks typically bypass network based security inspection in the network. | 06-14-2012 |
20120151588 | Malware Detection for SMS/MMS Based Attacks - Devices, systems, and methods are disclosed which utilize lightweight agents on a mobile device to detect message-based attacks. In exemplary configurations, the lightweight agents are included as contacts on the mobile device addressed to an agent server on a network. A malware onboard the mobile device, intending to propagate, unknowingly addresses the lightweight agents, sending messages to the agent server. The agent server analyzes the messages received from the mobile device of the deployed lightweight agents. The agent server then generates attack signatures for the malware. Using malware propagation models, the system estimates how many active mobile devices are infected as well as the total number of infected mobile devices in the network. By understanding the malware propagation, the service provider can decide how to deploy a mitigation plan on crucial locations. In further configurations, the mechanism may be used to detect message and email attacks on other devices. | 06-14-2012 |
20120311107 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS TO REDUCE LATENCY - Methods and apparatus to configure virtual private mobile networks for latency are disclosed. A disclosed example method includes provisioning logically a virtual private mobile network within a wireless network to reduce latency of a communication associated with a latency sensitive application, determining a mobile device is communicatively coupling to the wireless network via the latency sensitive application, and coupling the mobile device to the virtual private mobile network to reduce latency of the communication associated with the latency sensitive application. | 12-06-2012 |
20120331545 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS FOR SECURITY - Methods and apparatus to configure virtual private mobile networks for security are disclosed. A disclosed example method includes identifying, in a wireless network, a communication from a user equipment that matches a security event profile, transmitting, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network, and enabling the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network. | 12-27-2012 |
20130030693 | CELLULAR-BASED LIVE TRAFFIC SERVICE - A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices. | 01-31-2013 |
20130054763 | METHODS AND APPARATUS TO CONFIGURE VIRTUAL PRIVATE MOBILE NETWORKS WITH VIRTUAL PRIVATE NETWORKS - Methods and apparatus to configure virtual private mobile networks with virtual private networks are disclosed. A disclosed example method includes logically provisioning, for a client, the virtual private mobile network to process wireless network communications associated with the client that correspond to a specified address space of the client, provisioning at least a portion of a server within a cloud computing data center to host resources for the client, and configuring at least a portion of an edge router of the cloud computing data center to transmit the wireless network communications between the portion of the server and the virtual private mobile network. | 02-28-2013 |
20130055343 | Methods, Devices, Systems, and Computer Program Products for Edge Driven Communications Network Security Monitoring - An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed. | 02-28-2013 |
20130070599 | METHOD, NETWORK, AND COMPUTER PRODUCT FOR FLOW BASED QUALITY OF SERVICE - A method, network, and computer program product are provided for traffic flow quality of service. A quality of service priority table is received for services defined by a user at the network, and the quality of service priority table includes quality of service levels for the services. Traffic flows are determined to correspond to packets being communicated over the network for the user. The traffic flows are mapped to services. The traffic flows are mapped to the quality of service levels for the services. The quality of service levels are assigned to the traffic flows as assigned quality of service levels corresponding to the services. Each of the traffic flows is routed over the network according to its assigned quality of service levels, respectively. | 03-21-2013 |
20130074156 | METHOD AND SYSTEM FOR EXECUTION MONITOR-BASED TRUSTED COMPUTING - A system and method to ensure trustworthiness of a remote service provided by a service provider. The method includes monitoring runtime dependencies invoked during execution of a service transaction associated with the remote service, the service transaction being requested by a service requester. The method further includes determining whether a deviation exists between the runtime dependencies and a trusted list of dependencies associated with the remote service. The method also includes blocking execution of the service transaction based on determining that the deviation between the runtime dependencies and the trusted list of dependencies exists. | 03-21-2013 |
20130179066 | CELLULAR-BASED LIVE TRAFFIC SERVICE - A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices. | 07-11-2013 |
20140052277 | Method and system for controlling physical components via a virtual environment - A computer readable storage medium storing a set of instructions that are executable by a processor, the set of instructions being operable to store a virtual representation of a plurality of physical components, display the virtual representation, receive user interaction with at least one of the virtual representations and send a command to the physical component corresponding to the user interaction. | 02-20-2014 |
20140142843 | CELLULAR-BASED LIVE TRAFFIC SERVICE - A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices. | 05-22-2014 |
20140304820 | Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation - Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network. | 10-09-2014 |
20160044050 | Devices, Systems, and Methods for Detecting Proximity-Based Mobile Malware Propagation - Devices, systems, and methods are disclosed. An agent resides in a mobile communication device. The agent detects Proximity-based Mobile Malware Propagation. The agent injects one or more trigger network connections in the candidate connection list. These connections appear as legitimate networks and devices, but instead trigger connection to an agent server on a service provider's network. By attempting to connect through the trigger network connection, the malware reveals itself. The system helps collect the malware signature within a short period of time after the malware outbreak in local areas, though such attacks typically bypass network based security inspection in the network. | 02-11-2016 |
Patent application number | Description | Published |
20100142590 | CALIBRATION IN A SPREAD SPECTRUM COMMUNICATIONS SYSTEM - A method comprising: selecting an available orthogonal spreading code from a set of orthogonal spreading codes that are used for separating overlapping radio transmissions in a spread spectrum multiple access communication system; spreading a predetermined sequence using the selected spreading code; transmitting the spread predetermined sequence as a calibrating radio transmission; detecting a calibration signal corresponding to the calibrating radio transmission; and using the detected calibration signal to modify subsequent radio transmissions within the spread spectrum multiple access communication system. | 06-10-2010 |
20120257682 | POWER LINE COMMUNICATIONS DURING SELECTED TIME INTERVALS - A method of power line communications includes obtaining timing information for an AC mains signal transmitted on a power line in a power line communication (PLC) system that includes at least one receiver and at least one other device connected on the power line which provides variable loading during cycles of the AC mains signal. A first loading interval within at least a first cycle of the cycles having lower loading and at least a second loading interval within said first cycle having higher loading are identified using the timing information. At least one data packet is transmitted only during the first loading interval over the power line to the receiver. | 10-11-2012 |
20120320932 | DATA FRAME FOR PLC HAVING DESTINATION ADDRESS IN THE PHY HEADER - A method of powerline communications including a first node and at least a second node on a PLC channel in a PLC network. The first node sends a physical layer (PHY) data frame on the PLC channel including a preamble, PHY header, a MAC header and a MAC payload. The PHY header includes a destination address field having a destination address therein. The second node receives the data frame. The second node compares its network address to the destination address before decoding the MAC header and MAC payload, providing power savings by allowing the second node to not decode the MAC header or MAC payload if its network address does not match the destination address in the PHY header of the data frame. | 12-20-2012 |
20120320996 | PREAMBLE SEQUENCE EXTENSION - A method of powerline communications between a plurality of nodes on a powerline communications (PLC) channel including a first node and a second node. At least one communication quality measure is determined for the PLC channel. Based on the communication quality measure, a preamble of a data frame is dynamically switched between a reference preamble having a reference symbol length including a reference number of syncP symbols and a reference number of syncM symbols and at least a first extended preamble having an extended symbol length that is greater than (>) the reference symbol length. The data frame is then transmitted on the PLC channel. | 12-20-2012 |
20120324322 | POWERLINE COMMUNICATION FRAMES HAVING CRC WITHIN HEADER - A method of powerline communications including a first node and at least a second node on a powerline communications (PLC) channel in a PLC network. The first node sends a physical layer (PHY) data frame on the PLC channel including a preamble, a PHY header, a MAC header and a MAC payload. The MAC header includes a Cyclic Redundancy Check (CRC) field (MH-CRC field). The second node receives the data frame, parses the MAC header to reach the MH-CRC field, and performs CRC verification using the MH-CRC field to verify the MAC header. If the CRC verification is successful, (i) the second node parses another portion of the MAC header to identify a destination address of the data frame and (ii) to determine whether the data frame is intended for the second node from the destination address. | 12-20-2012 |
20130188670 | DYNAMIC IMPROVEMENT OF LINK SYMMETRY IN CO-LOCATED PLC AND RF NETWORKS - An electronic communication device comprises a first transceiver capable of a bi-directional communication session on a first communication medium; a second transceiver capable of a bi-directional communication session on a second communication medium; and a control logic coupled to the first transceiver and the second transceiver, wherein the control logic is configured to receive, from the first transceiver, a first signal, and cause, in response to the first signal, data transmitted by the first transceiver on the first communication medium as part of a communication session to be transmitted instead by the second transceiver on the second communication medium while the first transceiver continues to receive data as part of the communication session. | 07-25-2013 |
20130188673 | DYNAMIC MEDIUM SWITCH IN CO-LOCATED PLC AND RF NETWORKS - An electronic communication device comprises a first transceiver capable of a bi-directional communication session on a first communication medium; a second transceiver capable of a bi-directional communication session on a second communication medium; and a control logic coupled to the first transceiver and the second transceiver and capable of implementing a convergence layer, wherein the control logic is configured to receive, from the first transceiver, a first signal; and cause, in response to the first signal, data received and transmitted by the first transceiver on the first communication medium as part of a communication session to be received and transmitted instead by the second transceiver on the second communication medium. | 07-25-2013 |
20150085881 | DATA FRAME FOR PLC HAVING DESTINATION ADDRESS IN THE PHY HEADER - A physical layer (PHY) data frame for use in conjunction with processor in a node, processor coupled to a program memory for storing a sequence of operating instructions. The frame has a preamble, PHY header, a MAC header and a MAC payload. The PHY header includes a destination address field having a destination address therein. The destination address is used by the processor to determine match with the node address. | 03-26-2015 |
20150124688 | MULTISTAGE BEAMFORMING OF MULTIPLE-ANTENNA COMMUNICATION SYSTEM - A multistage beamforming circuit includes a data unit that implements a frequency domain beamforming stage and a remote radio head that implements a time-domain broadband beamforming stage. The data unit implements the frequency domain beamforming stage by converting K received data streams into M precoding output streams in a frequency-domain. The data unit is configured to transform the M output streams to M OFDM time-domain signals. The remote radio head, or integrated radio unit is configured to implement a time-domain broadband beamforming stage by converting the M OFDM time-domain signals into N transmit streams of time-domain samples. The remote radio head, or integrated radio unit includes a transmit antenna array configured to transmit the N transmit streams that together form broadcast beams and user-specific beams. The antenna array includes a plurality of physical antennas. The number N of transmit streams is greater than the number M of precoding output streams. | 05-07-2015 |
20160028438 | Dynamic Medium Switch in Co-Located PLC and RF Networks - A method for implementing a convergence layer. Data is received on a first communication medium by a first transceiver. Data is transmitted on the first communication medium by the first transceiver. A signal is received. Causing, through the convergence layer, by a control logic in response to the signal, the data received and transmitted on the first communication medium as part of a communication session to be received and transmitted instead by a second transceiver on a second communication medium, wherein the convergence layer is configured to conceal from a routing layer at least one of: information related to the first signal, and information related to the data being received and transmitted on the second communication medium. | 01-28-2016 |
Patent application number | Description | Published |
20090016599 | SEMANTIC REPRESENTATION MODULE OF A MACHINE-LEARNING ENGINE IN A VIDEO ANALYSIS SYSTEM - A machine-learning engine is disclosed that is configured to recognize and learn behaviors, as well as to identify and distinguish between normal and abnormal behavior within a scene, by analyzing movements and/or activities (or absence of such) over time. The machine-learning engine may be configured to evaluate a sequence of primitive events and associated kinematic data generated for an object depicted in a sequence of video frames and a related vector representation. The vector representation is generated from a primitive event symbol stream and a phase space symbol stream, and the streams describe actions of the objects depicted in the sequence of video frames. | 01-15-2009 |
20090016600 | COGNITIVE MODEL FOR A MACHINE-LEARNING ENGINE IN A VIDEO ANALYSIS SYSTEM - A machine-learning engine is disclosed that is configured to recognize and learn behaviors, as well as to identify and distinguish between normal and abnormal behavior within a scene, by analyzing movements and/or activities (or absence of such) over time. The machine-learning engine may be configured to evaluate a sequence of primitive events and associated kinematic data generated for an object depicted in a sequence of video frames and a related vector representation. The vector representation is generated from a primitive event symbol stream and a phase space symbol stream, and the streams describe actions of the objects depicted in the sequence of video frames. | 01-15-2009 |
20100061624 | DETECTING ANOMALOUS EVENTS USING A LONG-TERM MEMORY IN A VIDEO ANALYSIS SYSTEM - Techniques are described for detecting anomalous events using a long-term memory in a video analysis system. The long-term memory may be used to store and retrieve information learned while a video analysis system observes a stream of video frames depicting a given scene. Further, the long-term memory may be configured to detect the occurrence of anomalous events, relative to observations of other events that have occurred in the scene over time. A distance measure may used to determine a distance between an active percept (encoding an observed event depicted in the stream of video frames) and a retrieved percept (encoding a memory of previously observed events in the long-term memory). If the distance exceeds a specified threshold, the long-term memory may publish the occurrence of an anomalous event for review by users of the system. | 03-11-2010 |
20100063949 | LONG-TERM MEMORY IN A VIDEO ANALYSIS SYSTEM - A long-term memory used to store and retrieve information learned while a video analysis system observes a stream of video frames is disclosed. The long-term memory provides a memory with a capacity that grows in size gracefully, as events are observed over time. Additionally, the long-term memory may encode events, represented by sub-graphs of a neural network. Further, rather than predefining a number of patterns recognized and manipulated by the long-term memory, embodiments of the invention provide a long-term memory where the size of a feature dimension (used to determine the similarity between different observed events) may grow dynamically as necessary, depending on the actual events observed in a sequence of video frames. | 03-11-2010 |
20120163670 | BEHAVIORAL RECOGNITION SYSTEM - Embodiments of the present invention provide a method and a system for analyzing and learning behavior based on an acquired stream of video frames. Objects depicted in the stream are determined based on an analysis of the video frames. Each object may have a corresponding search model used to track an object's motion frame-to-frame. Classes of the objects are determined and semantic representations of the objects are generated. The semantic representations are used to determine objects' behaviors and to learn about behaviors occurring in an environment depicted by the acquired video streams. This way, the system learns rapidly and in real-time normal and abnormal behaviors for any environment by analyzing movements or activities or absence of such in the environment and identifies and predicts abnormal and suspicious behavior based on what has been learned. | 06-28-2012 |
20140072206 | SEMANTIC REPRESENTATION MODULE OF A MACHINE LEARNING ENGINE IN A VIDEO ANALYSIS SYSTEM - A machine-learning engine is disclosed that is configured to recognize and learn behaviors, as well as to identify and distinguish between normal and abnormal behavior within a scene, by analyzing movements and/or activities (or absence of such) over time. The machine-learning engine may be configured to evaluate a sequence of primitive events and associated kinematic data generated for an object depicted in a sequence of video frames and a related vector representation. The vector representation is generated from a primitive event symbol stream and a phase space symbol stream, and the streams describe actions of the objects depicted in the sequence of video frames. | 03-13-2014 |
20150046155 | COGNITIVE NEURO-LINGUISTIC BEHAVIOR RECOGNITION SYSTEM FOR MULTI-SENSOR DATA FUSION - Embodiments presented herein describe techniques for generating a linguistic model of input data obtained from a data source (e.g., a video camera). According to one embodiment of the present disclosure, a sequence of symbols is generated based on an ordered stream of normalized vectors generated from the input data. A dictionary of words is generated from combinations of the ordered sequence of symbols based on a frequency at which combinations of symbols appear in the ordered sequence of symbols. A plurality of phrases is generated based an ordered sequence of words from the dictionary observed in the ordered sequence of symbols based on a frequency by which combinations of words in ordered sequence of words appear relative to one another. | 02-12-2015 |
20150110388 | SEMANTIC REPRESENTATION MODULE OF A MACHINE-LEARNING ENGINE IN A VIDEO ANALYSIS SYSTEM - A machine-learning engine is disclosed that is configured to recognize and learn behaviors, as well as to identify and distinguish between normal and abnormal behavior within a scene, by analyzing movements and/or activities (or absence of such) over time. The machine-learning engine may be configured to evaluate a sequence of primitive events and associated kinematic data generated for an object depicted in a sequence of video frames and a related vector representation. The vector representation is generated from a primitive event symbol stream and a phase space symbol stream, and the streams describe actions of the objects depicted in the sequence of video frames. | 04-23-2015 |
Patent application number | Description | Published |
20120206386 | PORTABLE TERMINAL - The present invention provides a portable terminal, comprising: a first body provided with a first transparent display panel; a second body provided with a second transparent display panel; and a connecting part for movably connecting the first body with the second body; wherein both surfaces of the first transparent display panel are provided with a touch screen respectively; and at least one surface of the second transparent display panel is provided with a touch screen. The present invention provides a display area as large as possible. | 08-16-2012 |
20130105741 | Measuring Moisture In A CNT Based Fluid Or Paste | 05-02-2013 |
20130136994 | MODIFIED BATTERY ANODE WITH CARBON NANOTUBES - An improved anode material for a lithium ion battery is disclosed. The improved anode material can improve both electric conductivity and the mechanical resilience of the anode, thus drastically increasing the lifetime of lithium ion batteries. | 05-30-2013 |
20150116544 | METHOD AND APPARATUS OF WORKING MODE CONTROL, AND ELECTRONIC DEVICE - The embodiments of the present invention provide a method and an apparatus for controlling a working mode, and an electronic device. The method for controlling the working mode comprises: detecting, by an electronic device, an intensity of light entering a first camera; and switching, by the electronic device, the working mode, when detecting that a change of the intensity of light entering the first camera meets a first preset condition. The embodiments of the present invention can simplify the operation steps of the electronic device, and quickly and conveniently switch the working mode of the electronic device, such that the user obtains better experiences. | 04-30-2015 |
20150137620 | ANTI-INTERFERENCE SWITCH SIGNAL TRANSMISSION CIRCUIT - An anti-interference switch signal transmission circuit, in which a changeover contact is used at a signal terminal, wherein a normally closed contact is connected to DC−, a normally open contact is connected to DC+, and a common terminal is connected to a switch signal acquisition circuit. When no signal exists, DC− is connected to a positive input terminal of the switch signal acquisition circuit via the normally closed contact. Since a negative input terminal of the switch signal acquisition circuit is also connected to DC−, even if interference is caused, no false signal is generated. When a signal exists, the position of the changeover contact changes and DC+ is connected to DC− via the closed normally open contact through the switch signal acquisition circuit thus a loop is formed, so that the signal can be reflected. The interference problem is solved by connecting both the two terminals of the acquisition circuit to DC− when no signal exists. | 05-21-2015 |
20150184508 | COMPUTING SYSTEMS, TOOLS, AND METHODS FOR SIMULATING WELLBORE RE-ENTRY - Specialized computing systems, devices, interfaces and methods facilitate the simulation of downhole wellbore re-entry procedures such as sidetracking, rate hole extension, hole enlargement, window modification, fishing, and other re-entry procedures. Computing systems, devices, interfaces and methods enable a user to design and select BHA components and procedures to be compared and simulated. Various re-entry parameters, such as re-entry tool parameters, whipstock parameters, wellbore casing parameters, window parameters, rat hole parameters, and the like may be accessed and selectably modified with re-entry and simulation interfaces to define and control the simulated re-entry procedures. Different types of output are selectably rendered to reflect various aspects of the simulated re-entry procedures. | 07-02-2015 |
20150186570 | COMPUTING SYSTEMS, TOOLS, AND METHODS FOR SIMULATING WELLBORE DEPARTURE - Specialized computing systems, devices, interfaces and methods facilitate the simulation of downhole milling procedures such as wellbore departure milling procedures. Computing systems, devices, interfaces and methods enable a user to design and select milling components and procedures to be compared and simulated. Various milling parameters, such as milling tool parameters, whipstock parameters, and wellbore casing parameters may be accessed and selectably modified with milling and simulation interfaces to define and control the simulated milling procedures. Different types of output are selectably rendered to reflect various aspects of the simulated milling procedures. | 07-02-2015 |
20150186574 | COMPUTING SYSTEMS, TOOLS, AND METHODS FOR SIMULATING WELLBORE ABANDONMENT - Specialized computing systems, devices, interfaces and methods facilitate the simulation of downhole wellbore abandonment procedures such as section milling and casing milling. Computing systems, devices, interfaces and methods enable a user to design and select BHA components and procedures to be compared and simulated. Various parameters, such as wellbore casing parameters, milling tool parameters, simulation parameters, and the like may be accessed and selectably modified by user input with interactive elements presented at user interfaces to define and control simulations of abandonment procedures. Different types of output are selectably rendered to reflect various aspects of the simulated abandonment procedures. | 07-02-2015 |
20150311955 | WIRELESS CHARGING METHOD AND SYSTEM, AND MOBILE TERMINAL - The embodiments of the present application provide a wireless charging method and system, and a mobile terminal. The wireless charging method includes: activating a wireless charging function by a first mobile terminal and a second mobile terminal; determining that the first mobile terminal is a wireless charging sender, and the second mobile terminal is a wireless charging receiver; and performing a wireless charging on the second mobile terminal by the first mobile terminal. The embodiments of the present application solve the problem that the power is insufficient in emergency situations. In addition, the operation is simple and the usage limitations are reduced. | 10-29-2015 |
20150337640 | METHODS FOR ANALYZING AND OPTIMIZING CASING WHILE DRILLING ASSEMBLIES - A method for selecting a bottomhole assembly (BHA) includes inputting casing while drilling BHA parameters, wellbore parameters, and casing while drilling operating parameters, performing a dynamic simulation of a first BHA based on the casing while drilling BHA parameters, wellbore parameters, and casing while drilling operating parameters, and presenting a first set of performance data of the first BHA calculated from the dynamic simulation. | 11-26-2015 |
20160094824 | IMAGE PROCESSING METHOD, IMAGE PROCESSING APPARATUS AND ELECTRONIC DEVICE - The embodiments of the present application provide an image processing method, an image processing apparatus and an electronic device. The image processing apparatus includes: a shoot scene determination portion configured to determine a shoot scene of an image; an image analysis portion configured to analyze the image to determine a degree of influence of the shoot scene on the shoot quality of the image; and an image processing portion configured to perform a correction processing of the image according to the degree of influence. Through the embodiments of the present application, a correction processing of the image can be performed according to the degree of influence of the shoot scene on the shoot quality of the image, so as to reduce and even eliminate the degree of influence, thus improving the shoot quality of the image. | 03-31-2016 |