if Compositions comprising E-1,2-difluoroethylene and uses thereof By www.freepatentsonline.com Published On :: Tue, 24 Feb 2015 08:00:00 EST The present invention relates to compositions for use in refrigeration, air-conditioning, and heat pump systems wherein the composition comprises E-1,2-difluoroethylene. The compositions of the present invention are useful in processes for producing cooling or heat, as heat transfer fluids, foam blowing agents, aerosol propellants, and power cycle working fluids. Full Article
if Compositions comprising Z-1,2-difluoroethylene and uses thereof By www.freepatentsonline.com Published On :: Tue, 24 Feb 2015 08:00:00 EST The present invention relates to compositions for use in refrigeration, air-conditioning, and heat pump systems wherein the composition comprises Z-1,2-difluoroethylene (Z-HFO-1132a). The compositions of the present invention are useful in processes for producing cooling or heat, as heat transfer fluids, foam blowing agents, aerosol propellants, and power cycle working fluids. Full Article
if System and method for communicating with sensors/loggers in integrated radio frequency identification (RFID) tags By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system and method is disclosed for communicating with sensors/loggers in integrated radio frequency identification (RFID) tags. An RFID reader uses a Communicate With Data Logger Command to communicate with a data logger in an RFID tag. The RFID reader performs data access processes using an Index Register and a Data Register of the RFID tag. The RFID reader selects one of (1) Index Read access (2) Index Write access (3) Data Write access (4) Data Read access with parity and (5) Data Read access with cyclic redundancy check (CRC). The RFID tag performs the requested data access and then performs an error detection process. Full Article
if Accessing model specific registers (MSR) with different sets of distinct microinstructions for instructions of different instruction set architecture (ISA) By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A microprocessor capable of running both x86 instruction set architecture (ISA) machine language programs and Advanced RISC Machines (ARM) ISA machine language programs. The microprocessor includes a mode indicator that indicates whether the microprocessor is currently fetching instructions of an x86 ISA or ARM ISA machine language program. The microprocessor also includes a plurality of model-specific registers (MSRs) that control aspects of the operation of the microprocessor. When the mode indicator indicates the microprocessor is currently fetching x86 ISA machine language program instructions, each of the plurality of MSRs is accessible via an x86 ISA RDMSR/WRMSR instruction that specifies an address of the MSR. When the mode indicator indicates the microprocessor is currently fetching ARM ISA machine language program instructions, each of the plurality of MSRs is accessible via an ARM ISA MRRC/MCRR instruction that specifies the address of the MSR. Full Article
if Generating hardware events via the instruction stream for microprocessor verification By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A processor receives an instruction operation (OP) code from a verification system. The instruction OP code includes instruction bits and forced event bits. The processor identifies a forced event based upon the forced event bits, which is unrelated to an instruction that corresponds to the instruction bits. In turn, the processor executes the forced event. Full Article
if Converting existing artifacts to new artifacts By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Systems, Apparatus, methods, and computer program products are provided for converting an existing artifact to one or more new artifacts. For example, in one embodiment, a computing device can receive input identifying an existing artifact for conversion to one or more new artifacts. One or more items from the existing artifact and their respective types can be identified for conversion. Then, the one or more items of the existing artifact can be converted to one or more new artifacts. Full Article
if Conducting verification in event processing applications using formal methods By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method of applying formal verification methodologies to event processing applications is provided herein. The method includes the following stages: representing an event processing application as an event processing network, being a graph with event processing agents as nodes; generating a finite state machine based on the event processing network, wherein the finite state machine is an over-approximation of the event processing application; expressing stateful rules and policies that are associated with the event processing application using temporal logic, to yield a temporal representation of the event processing application; combining the temporal representation and the finite state machine into a model; generating a statement associated with a user-selected verification-related property of the event processing application, wherein the statement is generated using the temporal representation; and applying the statement to the model, to yield an indication for: (i) a correctness of the statement or (ii) a counter example, respectively. Full Article
if Unified and extensible asynchronous and synchronous cancelation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A cancelation registry provides a cancelation interface whose implementation registers cancelable items such as synchronous operations, asynchronous operations, type instances, and transactions. Items may be implicitly or explicitly registered with the cancelation registry. A consistent cancelation interface unifies cancelation management for heterogeneous items, and allows cancelation of a group of items with a single invocation of a cancel-registered-items procedure. Full Article
if System and method for recommending software artifacts By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method for recommending at least one artifact to an artifact user is described. The method includes obtaining user characteristic information reflecting preferences, particular to the artifact user, as to a desired artifact. The method also includes obtaining first metadata about each of one or more candidate artifacts, and scoring, as one or more scored artifacts, each of the one or more candidate artifacts by evaluating one or more criteria, not particular to the artifact user, applied to the first metadata. The method further includes scaling, as one or more scaled artifacts, a score of each of the one or more scored artifacts, by evaluating the suitability of each of the one or more scored artifacts in view of the user characteristic information. The method lastly includes recommending to the artifact user at least one artifact from among the one or more scaled artifacts based on its scaled score. Full Article
if Custom code lifecycle management By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method is provided to manage program code that runs in a computer system comprising: producing a management information structure that identifies a managed system within the computer system; producing a master object definition information structure that provides a mapping between master objects and corresponding managed code objects that run in the computer system; and requesting extraction of information from the managed system identified by the master information structure that relates to managed code objects that the object definition information structure maps to master objects. Full Article
if Compound versioning and identification scheme for composite application development By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention provides a method, a system and a computer program product for defining a version identifier of a service component. The method includes determining various specification levels corresponding to the service component. Thereafter, the determined specification levels are integrated according to a predefined hierarchy to obtain the version identifier of the service component. The present invention also enables the identification of the service components. The service components are identified from one or more service components on the basis of one or more user requirements. Full Article
if Identifying differences between source codes of different versions of a software when each source code is organized using incorporated files By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An aspect of the present invention identifies differences between source codes (e.g. of different versions of a software), when each source code is organized using incorporated files. In one embodiment, in response to receiving identifiers of a first and second source codes (each source code being organized as a corresponding set of code files), listings of the instructions in the first and second source codes are constructed. Each listing is constructed, for example, by replacing each incorporate statement in the source code with instructions stored in a corresponding one of code files. The differences between the first and second source codes are then found by comparing the constructed listings of instructions. Full Article
if Software modification methods to provide master-slave execution for multi-processing and/or distributed parallel processing By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT In one embodiment of the invention, a method is disclosed for modifying a pre-existing application program for multi-processing and/or distributed parallel processing. The method includes searching an application program for a computational loop; analyzing the computational loop to determine independence of the computational transactions of the computational loop; and replacing the computational loop with master code and slave code to provide master-slave execution of the computational loop in response to analyzing the computational loop to determine independence of the computational transactions of the computational loop. Multiple instances of the modified application program are executed to provide multi-processing and/or distributed parallel processing. Full Article
if Method for identifying problematic loops in an application and devices thereof By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT This invention relates to a method, computer readable medium, and apparatus for identifying one or more problematic loops in an application. This invention provides a Directed Acyclic Graph or DAG representation of structure of one or more loops in the application by performing a static and a dynamic analysis of the application source code and depicts the loop information as LoopID, loop weight, total loop iteration, average loop iteration, total loop iteration time, average loop iteration time and embedded vector size. This aids a programmer to concentrate on problematic loops in the application and analyze them further for potential parallelism. Full Article
if Electronic system with system modification control mechanism and method of operation thereof By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An electronic system and method of operation thereof includes: a control unit for receiving a patterned signal; a recognizer module, coupled to the control unit, for recognizing an unique trigger from the patterned signal; an operation module, coupled to the recognizer module, for detecting an operational mode from the unique trigger; and a change module, coupled to the operation module, for configuring a system state change of a memory sub-system based on the operational mode. Full Article
if Methods and systems to identify and reproduce concurrency violations in multi-threaded programs using expressions By www.freepatentsonline.com Published On :: Tue, 15 Sep 2015 08:00:00 EDT Methods and systems to identify and reproduce concurrency bugs in multi-threaded programs are disclosed. An example method disclosed herein includes defining a data type. The data type includes a first predicate associated with a first thread of a multi-threaded program that is associated with a first condition, a second predicate that is associated with a second thread of the multi-threaded program, the second predicate being associated with a second condition, and an expression that defines a relationship between the first predicate and the second predicate. The relationship, when satisfied, causes the concurrency bug to be detected. A concurrency bug detector conforming to the data type is used to detect the concurrency bug in the multi-threaded program. Full Article
if 4-alkyl substituted pyridines as odiferous substances By www.freepatentsonline.com Published On :: Tue, 21 Oct 2014 08:00:00 EDT The present invention primarily concerns certain 4-alkyl pyridines of the following formula (I), wherein R is C8-C12 alkyl, odiferous substance mixtures and aromatic substance mixtures containing these 4-alkyl pyridines, the respective uses thereof as an odiferous or aromatic substance (mixture) and corresponding perfumed products. Full Article
if Purification of crude glycerol By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT Crude glycerol obtained from raw materials, such as the glycerol obtained during the production of biodiesel or glycerol obtained during the conversion of fats or oils, is purified by forming a dioxolane therefrom by reacting the crude glycerol with a ketone or aldehyde, separating the dioxolane thus formed, converting the dioxolane into purified glycerol and ketone/aldehyde, and recovering the glycerol thus purified. Full Article
if Esterification process using extractive separation to produce feed for hydrogenolysis By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT Disclosed herein are processes for alcohol production by reducing an esterification product, such as ethyl acetate. The processes comprise esterifying acetic acid and an alcohol such as ethanol to produce an esterification product. The esterification product may be recovered using an extractive separation. The esterification product is reduced with hydrogen in the presence of a catalyst to obtain a crude reaction mixture comprising the alcohol, in particular ethanol, which may be separated from the crude reaction mixture. Full Article
if Phenol purification process By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT The present invention provides an easy process for purifying phenol by separating carbonyl compounds through selective hydrogenation of the compounds to the corresponding alcohols then distillation. The phenol purification process of the present invention comprises bringing phenol into contact with a copper-based catalyst in the presence of hydrogen to convert carbonyl compounds contained in the phenol to the corresponding alcohol compounds, and separating the alcohol compounds and phenol by distillation. Full Article
if Method for preparing 3-trifluoromethyl chalcones By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Disclosed is a method for preparing a compound of Formula 1 wherein Q and Z are as defined in the disclosure comprising distilling water from a mixture comprising a compound of Formula 2, a compound of Formula 3, a base comprising at least one compound selected from the group consisting of alkaline earth metal hydroxides of Formula 4 wherein M is Ca, Sr or Ba, alkali metal carbonates of Formula 4a wherein M1 is Li, Na or K, 1,5-diazabicyclo[4.3.0]non-5-ene and 1,8-diazabicyclo[5.4.0]undec-7-ene, and an aprotic solvent capable of forming a low-boiling azeotrope with water. Also disclosed is a method for preparing a compound of Formula 2 comprising (1) forming a reaction mixture comprising a Grignard reagent derived from contacting a compound of Formula 5 wherein X is Cl, Br or I with magnesium metal or an alkylmagnesium halide in the presence of an ethereal solvent, and then (2) contacting the reaction mixture with a compound of Formula 6 wherein Y is OR11 or NR12R13, and R11, R12 and R13 are as defined in the disclosure. Further disclosed is a method for preparing a compound of Formula 7 wherein Q and Z are as defined in the disclosure, using a compound of Formula 1 characterized by preparing the compound of Formula 1 by the method disclosed above or using a compound of Formula 1 prepared by the method disclosed above. Full Article
if Data mining in a digital map database to identify blind intersections along roads and enabling precautionary actions in a vehicle By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Disclosed is a feature for a vehicle that enables taking precautionary actions in response to conditions on the road network around or ahead of the vehicle, in particular, a blind intersection along a section of road. A database that represents the road network is used to determine locations where a blind intersection is located along a section of road. Then, precautionary action data is added to the database to indicate a location at which a precautionary action is to be taken about the blind intersection located along the section of road. A precautionary action system installed in a vehicle uses this database, or a database derived therefrom, in combination with a positioning system to determine when the vehicle is at a location that corresponds to the location of a precautionary action. When the vehicle is at such a location, a precautionary action is taken by a vehicle system as the vehicle is approaching a blind intersection. Full Article
if Vehicle notification sound emitting apparatus By www.freepatentsonline.com Published On :: Tue, 10 Nov 2015 08:00:00 EST A vehicle notification sound emitting apparatus is basically provided with a first sound emitting device, a second sound emitting device and a notification sound control device. The first sound emitting device emits a first intermittent notification sound inside a cabin interior of a vehicle. The second sound emitting device emits a second intermittent notification sound outside of the cabin interior of the vehicle. The notification sound control device operates the first and second sound emitting devices to separately emit the first and second intermittent notification sounds in at least a partially overlapping pattern in response to occurrence of a vehicle condition to convey a same type of vehicle information to both inside and outside of the cabin interior of the vehicle. The notification sound control device includes a cabin interior-exterior notification sound synchronizing section that is configured to synchronize the first and second intermittent notification sounds. Full Article
if Verification module apparatus for debugging software and timing of an embedded processor design that exceeds the capacity of a single FPGA By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A plurality of Field Programmable Gate Arrays (FPGA), high performance transceivers, and memory devices provide a verification module for timing and state debugging of electronic circuit designs. Signal value compression circuits and gigabit transceivers embedded in each FPGA increase the fanout of each FPGA. Ethernet communication ports enable remote software debugging of processor instructions. Full Article
if Digital circuit verification monitor By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A method, a system and a computer readable medium for providing information relating to a verification of a digital circuit. The verification may be formal verification and comprise formally verifying that a plurality of formal properties is valid for a representation of the digital circuit. The method comprises replacing at least a first input value relating to the representation of the digital circuit by a first free variable, determining if at least one of the plurality of formal properties is valid or invalid after replacing the first input value by the first variable and indicating if the at least one of the plurality of formal property is valid or invalid. The use of a free or open variable that has not determined value can be directly in the description or representation of the digital circuit. It is not necessary to insert errors or to apply an error model. Full Article
if Method and apparatus for creating and managing waiver descriptions for design verification By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT Methods are provided to facilitate automated creation and management of design rule checking or DRC waiver descriptions. Embodiments include receiving a plurality of first checksums corresponding to respective first geometric element violations waived in association with a block of an integrated circuit design, the first checksums being based on a first version of at least one design verification rule and/or of the block, receiving a second checksum corresponding to a second geometric element violation associated with the block, the second checksum being based on a second version of the design verification rule and/or of the block, determining whether the second checksum corresponds to at least one of the first checksums, and, if the second checksum does not correspond to at least one first checksum, generating a waiver request for the second geometric element error. Full Article
if Scan chain modification for reduced leakage By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A leakage power control vector is loaded into existing test scan chain elements for application to circuit elements of a circuit in which the leakage currents are to be controlled. The vector is designed to configure the circuit elements into states in which leakage currents are reduced. A multiplexer selects the power control vector for loading into the scan chain elements, and a clock generator clocks the configuration vector into the scan chain elements. A sleep mode detector may be provided to configure the multiplexer to select the power control vector and to operate the clock generator to clock the power control vector into the scan chain elements when a sleep mode of the circuit is detected. Full Article
if Method and system for critical dimension uniformity using charged particle beam lithography By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A method for mask data preparation or mask process correction is disclosed in which a set of charged particle beam shots is determined which is capable of forming a pattern on a surface, wherein critical dimension uniformity (CDU) of the pattern is optimized. In some embodiments the CDU is optimized by varying at least two factors. In other embodiments, model-based techniques are used. In yet other embodiments, the surface is a reticle to be used in an optical lithographic process to form a pattern on a wafer, and CDU on the wafer is optimized. Full Article
if System and method for containing analog verification IP By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A system, method, and computer program product for containing analog verification IP for circuit simulation. Embodiments introduce analog verification units (“vunits”), and corresponding analog verification files to contain them. Vunits allow circuit design verification requirement specification via text file. No editing of netlist files containing design IP is required to implement static and dynamic circuit checks, PSL assertions, clock statements, or legacy assertions. Vunits reference a top-level circuit or subcircuits (by name or by specific instance), and the simulator automatically binds vunit contents appropriately during circuit hierarchy expansion. Vunits may be re-used for other design cells, and may be easily processed by text-based design tools. Vunits may be provided via vunit_include statements in a control netlist file, command line arguments, or by directly placing a vunit block into a netlist. Vunits may also contain instance statements to monitor or process signals, such as those needed by assertions. Full Article
if Integrated circuit design verification through forced clock glitches By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A technique for determining whether an integrated circuit design is susceptible to glitches includes identifying storage elements in an original register-transfer level (RTL) file of the integrated circuit design and identifying clock signals for each of the storage elements in the original RTL file. The technique also includes generating respective assertions for each of the identified clock signals and identifying potential glitchy logic in respective clock paths for each of the identified clock signals. Finally, the technique includes inserting, at the potential glitchy logic, glitches in each of the respective clock paths of the original RTL file to provide a modified RTL file and executing an RTL simulation using the modified RTL file and the respective assertions. Full Article
if Gemini surfactants, process of manufacture and use as multifunctional corrosion inhibitors By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT Gemini surfactants of bis-N-alkyl polyether, bis-N-alkenyl polyether, bis-N-cycloalkyl polyether, bis-N-aryl polyether bis-beta or alpha-amino acids or their salts, are produced for use as multifunctional corrosion inhibitors, which protect and prevent corrosion of ferrous metals exposed to acidic, basic and neutral liquids when transporting or storing crude oil and liquid fuels. The surfactants are also used to inhibit corrosion of equipment and pipes used in cooling systems in petroleum and petrochemical equipment. The Gemini surfactants have the structural formula: Full Article
if Methods of splicing 2G rebco high temperature superconductors using partial micro-melting diffusion pressurized splicing by direct face-to-face contact of high temperature superconducting layers and recovering superconductivity by oxygenation annealing By www.freepatentsonline.com Published On :: Tue, 31 Mar 2015 08:00:00 EDT Disclosed is a splicing method of two second-generation ReBCO high temperature superconductor coated conductors (2G ReBCO HTS CCs), in which, with stabilizing layers removed from the two strands of 2G ReBCO HTS CCs through chemical wet etching or plasma dry etching, surfaces of the two high temperature superconducting layers are brought into direct contact with each other and heated in a splicing furnace in a vacuum for micro-melting portions of the surfaces of the high temperature superconducting layers to permit inter-diffusion of ReBCO atoms such that the surfaces of the two superconducting layers can be spliced to each other and oxygenation annealing for recovery of superconductivity which was lost during splicing. Full Article
if Device and method for the densification of filaments in a long superconductive wire By www.freepatentsonline.com Published On :: Tue, 21 Apr 2015 08:00:00 EDT A device for the high pressure densification of superconducting wire from compacted superconductor material or superconductor precursor powder particles, has four hard metal anvils (5, 6, 7, 8) with a total length (L2) parallel to the superconducting wire, the hard metal anvils borne in external independent pressure blocks (9, 10, 11), which are in turn either fixed or connected to high pressure devices, preferably hydraulic presses. At least one of the hard metal anvils is a free moving anvil (6) having clearances of at least 0.01 mm up to 0.2 mm towards the neighboring hard metal anvils (5, 8), so that no wall friction occurs between the free moving anvil and the neighboring anvils. This allows for high critical current densities Jc at reduced pressure applied to the hard metal anvils. Full Article
if Composite barrier-type Nb3AI superconducting multifilament wire material By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A composite barrier-type Nb3Al superconducting multifilament wire material comprises Nb barrier filaments, Ta barrier filaments, Nb bulk dummy filaments, and a Nb or Ta covering. In the composite barrier-type Nb3Al superconducting multifilament wire material, the Nb barrier filaments and Ta barrier filaments are disposed in the wire material so that the Nb barrier filaments are concentrated in a filament region near a core formed from the Nb bulk dummy filaments and only the Ta barrier filaments are disposed or the Nb barrier filaments are dispersed in the Ta barrier filaments in an outer layer portion formed from a region outside the Nb barrier filaments, excluding the Nb or Ta covering. Full Article
if Method for classifying audio signal into fast signal or slow signal By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Low bit rate audio coding such as BWE algorithm often encounters conflict goal of achieving high time resolution and high frequency resolution at the same time. In order to achieve best possible quality, input signal can be first classified into fast signal and slow signal. This invention focuses on classifying signal into fast signal and slow signal, based on at least one of the following parameters or a combination of the following parameters: spectral sharpness, temporal sharpness, pitch correlation (pitch gain), and/or spectral envelope variation. This classification information can help to choose different BWE algorithms, different coding algorithms, and different postprocessing algorithms respectively for fast signal and slow signal. Full Article
if Systems and methods for identifying and suggesting emoticons By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Computer-implemented systems and methods are provided for suggesting emoticons for insertion into text based on an analysis of sentiment in the text. An example method includes: determining a first sentiment of text in a text field; selecting first text from the text field in proximity to a current position of an input cursor in the text field; identifying one or more candidate emoticons wherein each candidate emoticon is associated with a respective score indicating relevance to the first text and the first sentiment based on, at least, historical user selections of emoticons for insertion in proximity to respective second text having a respective second sentiment; providing one or more candidate emoticons having respective highest scores for user selection; and receiving user selection of one or more of the provided emoticons and inserting the selected emoticons into the text field at the current position of the input cursor. Full Article
if Method and apparatus for processing audio frames to transition between different codecs By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method (700, 800) and apparatus (100, 200) processes audio frames to transition between different codecs. The method can include producing (720), using a first coding method, a first frame of coded output audio samples by coding a first audio frame in a sequence of frames. The method can include forming (730) an overlap-add portion of the first frame using the first coding method. The method can include generating (740) a combination first frame of coded audio samples based on combining the first frame of coded output audio samples with the overlap-add portion of the first frame. The method can include initializing (760) a state of a second coding method based on the combination first frame of coded audio samples. The method can include constructing (770) an output signal based on the initialized state of the second coding method. Full Article
if Messaging response system providing translation and conversion written language into different spoken language By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A messaging response system is disclosed wherein a service providing system provides services to users via messaging communications. In accordance with an exemplary embodiment of the present invention, multiple respondents servicing users through messaging communications may appear to simultaneously use a common “screen name” identifier. Full Article
if Alert event notification By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Alert event notifications may be provided by: displaying a first user interface layer including at least one user interface element configured to provide an alert event notification; displaying a second user interface layer such that at least a portion of the second user interface layer overlays the at least one user interface element configured to provide an alert event notification; detecting an alert event; and at least partially displaying the at least one user interface element configured to provide an alert event notification in an area where the at least a portion of the second user interface layer overlays the at least one user interface element configured to provide an alert event notification. Full Article
if Process for production of purified O-(2,6-dichloro-4-methyl-phenyl) O,O-dimethyl phosphorothioate By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT A process for producing a purified O-(2,6-dichloro-4-methylphenyl)-O,O-dimethyl phosphorothioate, the process comprising: the first step of bringing a crude O-(2,6-dichloro-4-methylphenyl)-O,O-dimethyl phosphorothioate into contact with an acid; andthe second step of recovering the purified O-(2,6-dichloro-4-methylphenyl)-O,O-dimethyl phosphorothioate from the mixture obtained in the first step. Full Article
if System and method for identifying exploitable weak points in a network By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with connections that one or more passive scanners observed in a network and current connections that one or more active scanners enumerated in the network. The observed and enumerated current connections may be used to model trust relationships and identify exploitable weak points in the network, wherein the exploitable weak points may include hosts that have exploitable services, exploitable client software, and/or exploitable trust relationships. Furthermore, an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network may be simulated to enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network. Full Article
if Home sensor data gathering for neighbor notification purposes By www.freepatentsonline.com Published On :: Tue, 02 Jun 2015 08:00:00 EDT In a computer-implemented method of generating event notifications, in-home data is received. The in-home data and environment data (e.g., weather, law enforcement, etc.) is generated by, or based on information generated by, a device located at a residence of an individual, and is analyzed to determine whether it is indicative of an event that should be reported to one or more neighboring residences and/or businesses. If the data is indicative of such an event, a notification is generated and transmitted to the relevant residences and/or businesses. Full Article
if Radio paging selective receiver with display for notifying presence of unread message based on time of receipt By www.freepatentsonline.com Published On :: Tue, 19 Jan 1999 08:00:00 EST A radio paging selective receiver determines that a received message is unread based on the time difference between the message reception time and the current time being larger that some predetermined value of time, and the paging selective receiver provides an indication of the unread message by displaying the reception time of the unread message in a second fashion which is visibly different from a first fashion normally used to display the current time. Full Article
if Magnification device for timepiece By www.freepatentsonline.com Published On :: Tue, 25 Sep 2007 08:00:00 EDT The device consists in compensating for the distortion of the characters marked on the dial caused by a lens, by writing the characters with a reverse pin cushion or barrel distortion. Full Article
if Memory storage apparatus, memory controller, and method for transmitting and identifying data stream By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A memory storage apparatus, a memory controller and method for transmitting and identifying data streams are provided. The memory controller passes at least a portion of a data stream received from a host system to a smart card chip of the memory storage apparatus. Then, the host system accurately receives a response message from the smart card chip by executing a plurality of read commands. The memory controller is capable of adding a first verification code to a response data stream sent to the host system, and is capable of adding a write token to each of data segments of the response data stream. The host system confirms the accuracy of the response data stream by verifying the first verification code or by verifying the write token of each of the data segments. Full Article
if Chaining move specification blocks By www.freepatentsonline.com Published On :: Tue, 25 Aug 2015 08:00:00 EDT An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory. Full Article
if Chaining move specification blocks By www.freepatentsonline.com Published On :: Tue, 20 Oct 2015 08:00:00 EDT An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory. Full Article
if Use of sulfonic acid for recovering glycerol resulting from the triglyceride transesterification reaction By www.freepatentsonline.com Published On :: Tue, 28 Apr 2015 08:00:00 EDT The present invention relates to the use of at least one sulfonic acid for recovering glycerol resulting from a reaction crude from transesterification of glycerides, in particular of triglycerides of vegetable and/or animal origin. The invention also relates to a process for purifying glycerol obtained as a by-product of triglyceride transesterification during the preparation of fatty acids, fatty esters and/or fatty acid salts, and also to a combined process for preparing, on the one hand, fatty acids, fatty esters and/or fatty acid salts and, on the other hand, glycerol, from triglycerides, using at least one sulfonic acid. Full Article
if Deep-ultraviolet chemically-amplified positive photoresist By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT The invention discloses a deep-ultraviolet chemically-amplified positive photoresist. The deep-ultraviolet chemically-amplified positive photoresist according to one embodiment of the invention includes a cyclopentenyl pimaric acid, a divinyl ether, a photoacid generator and an organic solvent. The deep-ultraviolet chemically-amplified positive photoresist according to the invention has a good sensitivity and a good transparency. Full Article
if Method for recovering and purifying propionic acid By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT The present invention provides a method for purifying and recovering propionic acid from an aqueous mixture containing a fermentation product obtained from a fermentation process using glycerol as substrate, the method comprising optionally acidifying the aqueous mixture to a pH below 4.5, subjecting the aqueous mixture to an extraction with extracting agent containing a heavy extractant and optionally a light extractant as a diluent to obtain an extract comprising the extracting agent and organic acids, and a raffinate comprising water and any unreacted glycerol, and subjecting the extract to vacuum evaporation to separate propionic acid-containing organic acids from the extractant. Full Article