Yixin
Yixin Chen, Shanghai CN
Patent application number | Description | Published |
---|---|---|
20150148073 | REDUCING SIGNALING LOAD CAUSED BY CHANGES IN TERMINAL LOCATION - This disclosure is directed to a serving node ( | 05-28-2015 |
Yixin Chen, Hebei CN
Patent application number | Description | Published |
---|---|---|
20120238646 | Method for Producing Methane by Catalytic Gasification of Coal and Device Thereof - The invention relates to a gasifier comprising a syngas generation section, a coal methanation section and a syngas methanation section in the order from bottom to top. The invention also relates to a process for preparing methane by catalytically gasifying coal using such a gasifier. Optionally, the gasifier is additionally provided with a coal pyrolysis section above the syngas methanation section. | 09-20-2012 |
Yixin Gao, Shenzhen CN
Patent application number | Description | Published |
---|---|---|
20150293898 | METHOD AND APPARATUS FOR WORD DETECTION IN APPLICATION PROGRAM - Embodiments of the present invention provide a method and an apparatus for word detection in an application program. The method includes extracting a resource file from a multilingual application program installation package and converting the resource file into a text file. The method further includes disassembling the text file according to a language version to acquire a corresponding language text file; invoking a language detection tool according to the language version; and checking the language text file by using the language detection tool to identify questionable character information. The apparatus for word detection includes a file processing module, configured to extract a resource file from a multilingual application program installation package, and convert the resource file into a text file; and a disassembling module, configured to disassemble the text file according to a language version to acquire a corresponding language text file. The apparatus further includes a tool invoking module, configured to invoke a language detection tool according to the language version; and a text detection module, configured to check the language text file by using the language detection tool to identify questionable character information. Word detection efficiency in an application program can be improved by adopting the present disclosure. | 10-15-2015 |
Yixin Jiang, Shenzhen, Guangdong CN
Patent application number | Description | Published |
---|---|---|
20160106629 | BIONIC PACIFIER - A bionic pacifier ( | 04-21-2016 |
Yixin Lin, Stormville, NY US
Patent application number | Description | Published |
---|---|---|
20130196338 | DETECTION OF BIOMARKERS AND BIOMARKER COMPLEXES - The invention features methods and devices for the detection of biomarker complexes and their components and for the sequential detection of multiple epitopes of a biomarker. The invention also features methods for diagnosing disease and evaluating the efficacy of treatment of a subject with a disease. | 08-01-2013 |
Yixin Liu, Paramus, NJ US
Patent application number | Description | Published |
---|---|---|
20090054477 | 4-thio substituted quinoline and naphthyridine compounds - The present invention relates to 4-thio substituted quinoline and naphthyridine derivatives and processes for their preparation. The invention also related to methods for treating infection of Hepatitis C virus by administering a 4-thio substituted quinoline or naphthyridine derivative. | 02-26-2009 |
20130177529 | Pyrazole Compounds - Aryl substituted pyrazole derivatives are provided, as well as processes for their preparation. The invention also provides compositions and methods for the treatment of HCV by administering a compound of the present invention, alone or in combination with additional antiviral agents, in a therapeutically effective amount. | 07-11-2013 |
Yixin Sun, San Ramon, CA US
Patent application number | Description | Published |
---|---|---|
20130091352 | Techniques to Classify Virtual Private Network Traffic Based on Identity - Techniques are provided for obtaining first and second digital certificates from a certificate authority database for establishing a secure exchange between network devices. The first digital certificate contains identity information of a first network device, and the second digital certificate contains classification information of the first network device. In one embodiment, a secure key exchange is initiated with the second network device, and the first and second digital certificates are transmitted as a part of the secure key exchange to the second network device. In another embodiment, the first and second digital certificates are received by an intermediate network device. The first digital certificate is encrypted and is not evaluated by the intermediate network device. The second digital certificate is evaluated for classification information of the first network device. Source information associated with the first network device is stored, and encrypted traffic is processed between the network devices. | 04-11-2013 |
20150067337 | Techniques to Classify Virtual Private Network Traffic Based on Identity - Techniques are provided for obtaining first and second digital certificates from a certificate authority database for establishing a secure exchange between network devices. The first digital certificate contains identity information of a first network device, and the second digital certificate contains classification information of the first network device. In one embodiment, a secure key exchange is initiated with the second network device, and the first and second digital certificates are transmitted as a part of the secure key exchange to the second network device. In another embodiment, the first and second digital certificates are received by an intermediate network device. The first digital certificate is encrypted and is not evaluated by the intermediate network device. The second digital certificate is evaluated for classification information of the first network device. Source information associated with the first network device is stored, and encrypted traffic is processed between the network devices. | 03-05-2015 |
Yixin Xu, Shanghai CN
Patent application number | Description | Published |
---|---|---|
20140331291 | METHOD FOR GENERATING AND CHECK-CONTROLLING NETWORK IDENTITY INDENTIFICATION CODE IN NETWORK ELECTRONIC IDENTIFICATION CARD - The present invention relates to a method for generating and check-controlling a network identity identification code in a network electronic identity. The method comprises: a server performing initialization and performing generation and distribution of random numbers; receiving and auditing a request to generate the network identity identification code from a client; if the auditing is passed, performing encryption coding and generating a network identity identification code, and then sending the network identity identification code to a network electronic identification card through the client; the network electronic identification card performing the check processing of a network identity identification code, and feeding back a result to the server; the server storing the network identity identification code into a database, and informing the user. By means of the method for generating and check-controlling a network identity identification code in a network electronic identification card, the purposes of network identity management and privacy protection are both achieved, thereby effectively protecting the network application security and identity information privacy of citizens. The method is convenient and quick in use, has stable and reliable working performance, and has a wide application range, thereby laying a strong foundation for establishment of unified network identity management and service ecosystem. | 11-06-2014 |
Yixin Yang, Brooklyn, NY US
Patent application number | Description | Published |
---|---|---|
20090054610 | METHOD FOR PREPARING LONG-CHAIN HYDROXYACIDS, DIACIDS AND OLIGOMERS AND POLYMERS THEREOF - A method and process for the preparation of ricinoleic acid analogs and oligomers and polymers containing such ricinoleic acid analogs. | 02-26-2009 |
Yixin Yang, Beijing CN
Patent application number | Description | Published |
---|---|---|
20100185769 | Methods for Downloading a File to Consumer Electronic Devices via a Peer-to-peer Network - This invention relates to methods for downloading a user requested file via a peer-to-peer network, comprising the steps of: generating a second queue for containing one or more trying-to-connect peers, a third queue for containing currently-connected peers, and a forth queue for containing previously-connected peers; requesting from said servers one or more available peers, wherein said available peers having one or more blocks of said user requested file; placing said available peers in said second queue; connecting to the peers in the second queue, wherein upon successfully connecting to a peer in the second queue, placing such peer in said third queue; and downloading one or more blocks from the peers in said third queue. | 07-22-2010 |
20100186053 | Methods for Managing Content for Consumer Electronic Devices - The present invention relates to methods for managing content for a consumer electronic device (“CED”) via one or more networks, wherein the CED being uniquely identifiable, comprising the steps of: providing a server, wherein the server being connectable to the CED; connecting remotely by a user device to the server via the networks; providing by the user device to the server a content request for the CED, wherein the content request requesting a content and the content being located at one or more locations; requesting by the server for the locations of the content; providing by the server to the CED the locations of the content; and fetching the content by the CED from the locations of the content. | 07-22-2010 |
20120159456 | INSTRUMENTED APPLICATION IN A MOBILE DEVICE ENVIRONMENT - A method for utilizing an instrumented application in a mobile device environment. The method includes instrumenting an application to generate an instrumented application configured for use in the mobile device environment, obtaining authorization from a governing body for use of the instrumented application in the mobile device environment, and directing the instrumented application to cause a mobile device to operate according to a first setting. The first setting is invoked without requiring further authorization by the governing body. | 06-21-2012 |
20130321555 | CONTROLLING CPU USAGE TO BALANCE FAST AND SLOW DEVICES - A system for enabling communication between devices is described. The system includes the following: a media processing information receiver configured for receiving, at a first device, media processing information associated with a second device, wherein at least one of the first and second device is a mobile device; a comparer configured for comparing the media processing information to a processing time of the at least one media processing component of the first device; a target adjustment level determiner configured for determining a target adjustment level, wherein arriving at the target adjustment level enables the first and second device to achieve a matching media processing quality level; and a media processing component adjuster coupled with the computer and configured for adjusting the at least one media processing component of the first device to meet the target adjustment level. | 12-05-2013 |
20140104493 | PROACTIVE VIDEO FRAME DROPPING FOR HARDWARE AND NETWORK VARIANCE - A method and system for proactively dropping video frames are disclosed. The method includes: recording, by a computer, a video frame capture timestamp for a video frame that is captured at a first device; associating, by the computer, the video frame capture timestamp to the video frame that is captured; comparing, by the computer, the video frame capture timestamp with a video frame target timestamp for the video frame; and based on the comparing, if a time difference between the video frame capture timestamp and the video frame target timestamp is outside of a predetermined range of time values, then dropping, by the computer, the video frame. | 04-17-2014 |
20140192825 | JOINT RETRANSMISSION AND FRAME SYNCHRONIZATION FOR ERROR RESILIENCE CONTROL - A method for controlling error resilience in network communication is described. The method includes: determining, by a receiver-side controller, a packet gap representing a packet loss of a packet being communicated over a network; projecting, by the receiver-side controller, a retransmission time-out for at least one missing packet of the packet loss; issuing, by the receiver-side controller, a retransmission request for the at least one missing packet; if the packet gap is not filled within a first time period of the retransmission time-out, then issuing, by the receiver-side controller, at least one synchronization frame request; and selecting, by a sender-side controller, to respond to at least one of either of the retransmission request or the at least one synchronization frame request and neither of the retransmission request nor the at least one synchronization frame request. | 07-10-2014 |
20150156008 | JOINT RETRANSMISSION AND FRAME SYNCHRONIZATION FOR ERROR RESILIENCE CONTROL - A method for controlling error resilience in network communication is described. The method includes: determining, by a receiver-side controller, a packet gap representing a packet loss of a packet being communicated over a network; projecting, by the receiver-side controller, a retransmission time-out for at least one missing packet of the packet loss; issuing, by the receiver-side controller, a retransmission request for the at least one missing packet; if the packet gap is not filled within a first time period of the retransmission time-out, then issuing, by the receiver-side controller, at least one synchronization frame request; and selecting, by a sender-side controller, to respond to at least one of either of the retransmission request or the at least one synchronization frame request and neither of the retransmission request nor the at least one synchronization frame request. | 06-04-2015 |
Yixin Yu, Tianjin CN
Patent application number | Description | Published |
---|---|---|
20140236513 | REGION-BASED SECURITY EVALUATION METHOD FOR THE ELECTRIC POWER DISTRIBUTION SYSTEM - The invention discloses a region-based security evaluation method for the distribution system, which belongs to the field of electric power distribution system operation. The method contains the following steps: a. acquiring distribution system security region and security boundaries according to substation transformer capacity of the distribution system and link relationships among the substation transformers ( | 08-21-2014 |
20150309092 | Current Pattern Matching Method for Non-Intrusive Power Load Monitoring and Disaggregation - A harmonic-characteristics based current pattern matching method for the non-intrusive power load monitoring and disaggregation is provided in this present invention, on the basis of establishing the load signature database, which comprises electrical appliance registration and load state word space initialization, data acquisition and data preprocessing, feasible state word space search based on table looking-up, the optimal matching of current pattern, and display and output of the monitoring and disaggregation results. The method improves the accuracy of disaggregation, and can achieves exact identification of operating states of appliances, and also can reduce the cost. | 10-29-2015 |
20150310366 | Security region based security-constrained economic dispatching method - The present invention relates to a power system and provides a method for considering the network security constraints of in the operation of economic dispatch of power systems, which comprises the power flow constraint of branches, the static voltage stability constraint and the transient stability constraint, and provides an effective way for coordinating contradiction between the economy and security of power system operation. The security region based security-constrained economic dispatching method comprises the following steps: step 1, calculating the coefficients for the active power static security region, the cut-set voltage stability region and the dynamic security region respectively; step 2: building the models for security region based security-constrained economic dispatch; step 3: solving the unit on/off state optimal sub-problem through Social Evolutionary Programming; step 4: calculating the generation cost, the static voltage stability margin and the transient stability margin in the dispatching period; step 5: obtaining a feasible economic dispatching scheme, otherwise, return to step 3. The invention is mainly applied in load dispatching optimization. | 10-29-2015 |
Yixin Zhao, Beijing CN
Patent application number | Description | Published |
---|---|---|
20130081954 | METHOD FOR EXTRACTING GALLIUM FROM FLY ASH - Disclosed is a method for extracting gallium from fly ash, which comprises the following steps: crushing the fly ash and removing Fe by magnetic separation; then dissolving it by using hydrochloride acid to obtain hydrochloric acid leachate; adsorbing gallium contained in the hydrochloric acid leachate with macro-porous cationic resin, followed by eluting to obtain an eluent containing gallium; adding masking agent to mask ferric ion to obtain an eluent containing gallium after masking; adsorbing gallium in the eluent containing gallium after masking with macro-porous cationic resin, followed by eluting to obtain a secondary eluent; adding sodium hydroxide solution into the secondary eluent to react; filtering and removing precipitates after reaction, and then concentrating the filtrate and electrolyzing to obtain metal gallium. The method simplifies the process and improves extraction efficiency of gallium. | 04-04-2013 |
20130115149 | METHOD FOR PREPARING METALLURGICAL-GRADE ALUMINA BY USING FLUIDIZED BED FLY ASH - Provided a method for preparing metallurgical-grade alumina by using fluidized-bed fly ash, comprising: a) removing iron by wet magnetic separation after crushing the fly ash; b) reacting the fly ash after magnetic separation with hydrochloric acid to obtain a hydrochloric leachate; c) passing the hydrochloric leachate through macro-porous cationic resin to deeply remove iron to obtain a refined aluminum chloride solution; d) concentrating and crystallizing the refined aluminum chloride solution to obtain an aluminum chloride crystal; and e) calcining the aluminum chloride crystal to obtain the metallurgical-grade alumina. The method is simple, the procedure is easy to be controlled, the extraction efficiency of alumina is high, the production coast is low, and the product quality is steady. | 05-09-2013 |
Yixin Zhou, Beijing CN
Patent application number | Description | Published |
---|---|---|
20150289890 | METHOD AND SYSTEM FOR ACQUIRING ATTITUDE OF ACETABULUM AND FEMORAL HEAD IN REAL TIME DURING HIP JOINT REPLACEMENT PROCEDURE - A method and system for acquiring the attitudes of an acetabulum and a femoral head in real time during an artificial hip joint replacement procedure; during hip joint replacement, a pressure sensor and/or a touch sensor are disposed at each pressure point concerned for a femoral head prosthesis test mould, forming a sensor array ( | 10-15-2015 |