Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

207results about How to "Easy mapping" patented technology

Intrusion threat detection

A system is disclosed that can be used to monitor for an attempted intrusion of an access system. The system detects an access system event in the access system and determines whether the access system event is of a type that is being monitored. If the access system event is of a type that is being monitored, the system reports information about the access system event. This information can be used by a rules engine or other process to determine if the access system event was part of an attempted intrusion of the access system.
Owner:ORACLE USA

Access tester

The Access Tester allows an administrator, or any other authorized user, to determine who or what entities have access to a resource, whether a particular individual or set of individuals have access to a resource under certain conditions and whether the authorization rules associated with a resource operate as intended. In one embodiment, an administrator uses a graphical user interface to enter access information. Exemplar access information includes one or more URLs identifying the resource(s), one or more request methods, one or more IP addresses, date and time restrictions, and an identification of one or more users. The Access Tester determines whether the identified users are authorized to access the resource(s) associated with the URL(s) using the request methods, during the date and time provided.
Owner:ORACLE INT CORP

Methods and apparatuses for selecting levels of detail for objects having multi-resolution models in graphics displays

The level of detail selected for each object in a scene is determined based upon a variable normalized risk parameter which may be supplied by the application. A recursive composite parent object process is invoked upon the two children of the scene object in order to allocate graphics resources to objects A and B. Primary and secondary hit value means corresponding to objects A and B are computed. The hit value means are the average sum of hit values recorded for all the leaf objects contained by the objects over a predetermined number of frames. The statistical variances of the primary hit value and secondary hit value are also computed over the previous predetermined number of frames in order facilitates the mapping of the normalized risk parameter to a non-normalized risk parameter indicating the optimal risk for objects A and object B. A quadratic parametric variance equation is solved for the optimal fraction of the remaining graphics resources to be allocated to object A. The optimal fraction is multiplied by the available graphics resources, resulting in the resources allocated to object A; the remaining graphics resources are to object B. If either object A or B is a leaf object, the level of detail is selected for object A or B as the level of detail associated with object A or B requiring the greatest amount of graphics resources not exceeding the resources allocated to object A or B. If either object A or B is a composite parent object, the recursive parent object process is invoked on the two children of object A or B with the available graphics resources for the instantiation of the recursive parent object process set to the graphics resources allocated to object A or B. After levels of detail for all objects in the scene has been achieved, the method according to the present invention renders all leaf objects.
Owner:XEROX CORP

Technique for compressing columns of data

An approach for providing compression of a database table that uses a compiled table algorithm (CTA) that provides leverage. Data within any given column in adjacent rows is often the same as or closely related to its neighbors. Rather than storing data in each column of each row as a specific integer, floating point, or character data value, a field reconstruction instruction is stored that when executed by a decompression engine can reconstruct the data value. The field reconstruction instruction may be bit granular and may depend upon past history given that the data compression engine may preserve state as row data is streamed off a storage device.
Owner:EDISON VAULT LLC

Wind Turbine and Method for the Automatic Correction of Wind Vane Settings

The invention relates to a wind turbine comprising a machine housing (12) equipped with a rotor (14), which is mounted to pivot on a sub-structure (10). Wind parameters and an electromechanical quantity are determined by means of measuring devices (21, 22, 23). To enable the machine housing (12) to track the wind, the wind turbine is equipped with a pivoting device (11) comprising a controller (8). The wind turbine is also equipped with a calibration module (2), which is configured to determine an effective mass of the electromechanical quantity using the wind speed. In addition, the turbine comprises an evaluation device (4) comprising a classifier (40), which is used to form a first average value for a first class, for which the wind direction is positive and a second average value for a second class, for which the wind direction is negative. A difference is determined by means of a comparator and a calibration signal is emitted to the controller (8) of the pivoting device (11). The invention permits an autonomous calibration of the controller (8) for the tracking of the machine housing (12) and thus reduces the risk of an erroneous positioning of the rotor (14) in relation to the wind direction, irrespective of the prevailing wind conditions. The invention is particularly stable in relation to variable wind forces and directions, especially in the presence of gusts.
Owner:SENVION GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products