Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

1360results about How to "Improve method" patented technology

Multi-dimensional data protection and mirroring method for micro level data

The invention discloses a data validation, mirroring and error/erasure correction method for the dispersal and protection of one and two-dimensional data at the micro level for computer, communication and storage systems. Each of 256 possible 8-bit data bytes are mirrored with a unique 8-bit ECC byte. The ECC enables 8-bit burst and 4-bit random error detection plus 2-bit random error correction for each encoded data byte. With the data byte and ECC byte configured into a 4 bit×4 bit codeword array and dispersed in either row, column or both dimensions the method can perform dual 4-bit row and column erasure recovery. It is shown that for each codeword there are 12 possible combinations of row and column elements called couplets capable of mirroring the data byte. These byte level micro-mirrors outperform conventional mirroring in that each byte and its ECC mirror can self-detect and self-correct random errors and can recover all dual erasure combinations over four elements. Encoding at the byte quanta level maximizes application flexibility. Also disclosed are fast encode, decode and reconstruction methods via boolean logic, processor instructions and software table look-up with the intent to run at line and application speeds. The new error control method can augment ARQ algorithms and bring resiliency to system fabrics including routers and links previously limited to the recovery of transient errors. Image storage and storage over arrays of static devices can benefit from the two-dimensional capabilities. Applications with critical data integrity requirements can utilize the method for end-to-end protection and validation. An extra ECC byte per codeword extends both the resiliency and dimensionality.
Owner:HALFORD ROBERT

Browser and plural active URL manager for network computers

A network browser is provided with working list maintenance and creation facility which contains an indicator for each URL's listing duration level of permanence for controlling how long a URL will be kept or maintained in the working list and also includes an activity duration permanence level indicator for controlling how long the URL will be kept active. This enables the browser to maintain multiple, concurrently active URLs and thereby enable the browser to provide the functional emulation of a desktop working environment to the user.
Owner:WISTRON CORP

Contract based enterprise application services

The invention includes systems and methods of facilitating interaction between service consumers and services providers based on service contracts. These service contracts are established by considering preferences, capabilities or limitations of each service consumer and at least one characteristic of each service provider. Once the preferences, capabilities or limitations of a service consumer are determined these may be used to automatically established individualized service contracts with a variety of service providers. The services contracts may include contract terms relating to data format, communication protocol, security, data logging, load balancing, service level agreements, service quality, performance requirements, or the like.
Owner:SOFTWARE AG

Non-volatile differential dynamic random access memory

In accordance with the present invention, a memory cell includes a pair of non-volatile devices and a pair of DRAM cells each associated with a different one of the non-volatile devices. Each DRAM cell further includes an MOS transistor a capacitor. The DRAM cells and their associated non-volatile devices operate differentially and when programmed store and supply complementary data. The non-volatile devices are erased prior to being programmed. Programming of the non-volatile devices may be done via hot-electron injection or Fowler-Nordheim tunneling. When a power failure occurs, the data stored in the DRAM are loaded in the non-volatile devices. After the power is restored, the data stored in the non-volatile devices are restored in the DRAM cells. The differential reading and wring of data reduces over-erase of the non-volatile devices.
Owner:O2IC

Virtual reality display apparatus and display method thereof

A virtual reality display apparatus and display method thereof are provided. The display method includes displaying a virtual reality image; acquiring object information regarding a real-world object based on a binocular view of the user; and displaying the acquired object information together with the virtual reality image.
Owner:SAMSUNG ELECTRONICS CO LTD

Apparatus and method for securing a cementless glenoid component to a glenoid surface of a scapula

A glenoid component for securement to a glenoid surface of a scapula so as to provide a bearing surface for a head portion of a humerus includes a body portion having a first surface configured to contact the glenoid surface of the scapula and a second surface configured to receive the head portion of the humerus. The glenoid component also includes an anchor peg extending from the first surface of the body portion for penetrating the glenoid surface of the scapula so as to secure the body portion to the glenoid surface of the scapula. The anchor peg has a first end portion and a second end portion with the first end portion of the anchor peg being secured to the first surface of the body portion, and the second end portion of the anchor peg having a number of fins secured thereto. The glenoid component also includes a first stabilizing peg extending from the first surface of the body portion for penetrating the glenoid surface of the scapula so as to prevent movement of the body portion relative to the glenoid surface of the scapula. A method of securing a glenoid component to a glenoid surface of a scapula so as to provide a bearing surface for a head portion of a humerus is also disclosed.
Owner:DEPUY PROD INC

Methods and devices for source controlled variable bit-rate wideband speech coding

ActiveUS20050177364A1Improve methodImproved signal classificationSpeech analysisControl variableSubjective quality
Speech signal classification and encoding systems and methods are disclosed herein. The signal classification is done in three steps each of them discriminating a specific signal class. First, a voice activity detector (VAD) discriminates between active and inactive speech frames. If an inactive speech frame is detected (background noise signal) then the classification chain ends and the frame is encoded with comfort noise generation (CNG). If an active speech frame is detected, the frame is subjected to a second classifier dedicated to discriminate unvoiced frames. If the classifier classifies the frame as unvoiced speech signal, the classification chain ends, and the frame is encoded using a coding method optimized for unvoiced signals. Otherwise, the speech frame is passed through to the “stable voiced” classification module. If the frame is classified as stable voiced frame, then the frame is encoded using a coding method optimized for stable voiced signals. Otherwise, the frame is likely to contain a non-stationary speech segment such as a voiced onset or rapidly evolving voiced speech signal. In this case a general-purpose speech coder is used at a high bit rate for sustaining good subjective quality.
Owner:NOKIA TECHNOLOGLES OY

Two step lateral flow assay methods and devices

Lateral flow assay devices and methods for detecting a first member of a specific binding pair in a sample which comprises a plurality of nonspecific binding pair members are adapted for two step determinations. In one embodiment, a two step lateral flow assay method for identifying IgE antibodies in a sample comprises applying a sample to a sample port of a device, wherein the device is adapted to deliver the sample to a lateral flow matrix having a plurality of IgE antigen species immobilized at respective positions at a first location The two step method further comprises allowing the sample to travel along the lateral flow matrix through the immobilized plurality of IgE antigen species to a second location downstream of the first location, applying liquid buffer to the lateral flow matrix to mobilize labeled reagent which is adapted to bind anti-IgE antibody and is dried on the lateral flow matrix at a location upstream of the delivery of the filtered sample to the lateral flow matrix, and allowing labeled reagent mobilized by the liquid buffer to travel along the lateral flow matrix through the immobilized plurality of IgE antigen species to a location downstream of the first location. Further embodiments comprise additional lateral flow immunoassay devices and methods for identifying IgE antibodies in a sample.
Owner:PHADIA AB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products