inst 7 Simple Ways to Get Even More Engaged Instagram Followers By dailyblogtips.com Published On :: Tue, 28 May 2019 19:47:50 +0000 Instagram is one of the most efficient and fastest growing social networks. Brands and businesses love it and leverage it to promote and market their products and services to billions of users worldwide. More and more brands are competing for declining customer attention whose span is now no more than a Goldfish’s at 8s. Hence, […] Original post: 7 Simple Ways to Get Even More Engaged Instagram Followers The post 7 Simple Ways to Get Even More Engaged Instagram Followers appeared first on Daily Blog Tips. Full Article Internet Marketing
inst Federal Watchdog Backs Reinstating Ousted Vaccine Expert By feeds.drudge.com Published On :: Fri, 08 May 2020 20:23:47 -0400 A federal watchdog is recommending that ousted vaccine expert Rick Bright be reinstated while it investigates whether the Trump administration retaliated against his whistleblower complaints when it removed him from a key post overseeing the coronavirus response, Bright's lawyers said Friday. Full Article news
inst Weird glitch lets you post insanely long photos to Instagram By feedproxy.google.com Published On :: Fri, 08 May 2020 10:13:45 +0000 Have you noticed extra-long and weirdly stretched images on your Instagram feed? It looks like some kind of a glitch has appeared, allowing users to post images like this to their followers. Of course, some Instagrammers have made the use of it to draw attention, and if you want to have some fun (or annoy […] The post Weird glitch lets you post insanely long photos to Instagram appeared first on DIY Photography. Full Article news glitch Instagram
inst Toric Sasaki-Einstein metrics with conical singularities. (arXiv:2005.03502v1 [math.DG]) By arxiv.org Published On :: We show that any toric K"ahler cone with smooth compact cross-section admits a family of Calabi-Yau cone metrics with conical singularities along its toric divisors. The family is parametrized by the Reeb cone and the angles are given explicitly in terms of the Reeb vector field. The result is optimal, in the sense that any toric Calabi-Yau cone metric with conical singularities along the toric divisor (and smooth elsewhere) belongs to this family. We also provide examples and interpret our results in terms of Sasaki-Einstein metrics. Full Article
inst Semiglobal non-oscillatory big bang singular spacetimes for the Einstein-scalar field system. (arXiv:2005.03395v1 [math-ph]) By arxiv.org Published On :: We construct semiglobal singular spacetimes for the Einstein equations coupled to a massless scalar field. Consistent with the heuristic analysis of Belinskii, Khalatnikov, Lifshitz or BKL for this system, there are no oscillations due to the scalar field. (This is much simpler than the oscillatory BKL heuristics for the Einstein vacuum equations.) Prior results are due to Andersson and Rendall in the real analytic case, and Rodnianski and Speck in the smooth near-spatially-flat-FLRW case. Similar to Andersson and Rendall we give asymptotic data at the singularity, which we refer to as final data, but our construction is not limited to real analytic solutions. This paper is a test application of tools (a graded Lie algebra formulation of the Einstein equations and a filtration) intended for the more subtle vacuum case. We use homological algebra tools to construct a formal series solution, then symmetric hyperbolic energy estimates to construct a true solution well-approximated by truncations of the formal one. We conjecture that the image of the map from final data to initial data is an open set of anisotropic initial data. Full Article
inst Defending Hardware-based Malware Detectors against Adversarial Attacks. (arXiv:2005.03644v1 [cs.CR]) By arxiv.org Published On :: In the era of Internet of Things (IoT), Malware has been proliferating exponentially over the past decade. Traditional anti-virus software are ineffective against modern complex Malware. In order to address this challenge, researchers have proposed Hardware-assisted Malware Detection (HMD) using Hardware Performance Counters (HPCs). The HPCs are used to train a set of Machine learning (ML) classifiers, which in turn, are used to distinguish benign programs from Malware. Recently, adversarial attacks have been designed by introducing perturbations in the HPC traces using an adversarial sample predictor to misclassify a program for specific HPCs. These attacks are designed with the basic assumption that the attacker is aware of the HPCs being used to detect Malware. Since modern processors consist of hundreds of HPCs, restricting to only a few of them for Malware detection aids the attacker. In this paper, we propose a Moving target defense (MTD) for this adversarial attack by designing multiple ML classifiers trained on different sets of HPCs. The MTD randomly selects a classifier; thus, confusing the attacker about the HPCs or the number of classifiers applied. We have developed an analytical model which proves that the probability of an attacker to guess the perfect HPC-classifier combination for MTD is extremely low (in the range of $10^{-1864}$ for a system with 20 HPCs). Our experimental results prove that the proposed defense is able to improve the classification accuracy of HPC traces that have been modified through an adversarial sample generator by up to 31.5%, for a near perfect (99.4%) restoration of the original accuracy. Full Article
inst Enhancing Geometric Factors in Model Learning and Inference for Object Detection and Instance Segmentation. (arXiv:2005.03572v1 [cs.CV]) By arxiv.org Published On :: Deep learning-based object detection and instance segmentation have achieved unprecedented progress. In this paper, we propose Complete-IoU (CIoU) loss and Cluster-NMS for enhancing geometric factors in both bounding box regression and Non-Maximum Suppression (NMS), leading to notable gains of average precision (AP) and average recall (AR), without the sacrifice of inference efficiency. In particular, we consider three geometric factors, i.e., overlap area, normalized central point distance and aspect ratio, which are crucial for measuring bounding box regression in object detection and instance segmentation. The three geometric factors are then incorporated into CIoU loss for better distinguishing difficult regression cases. The training of deep models using CIoU loss results in consistent AP and AR improvements in comparison to widely adopted $ell_n$-norm loss and IoU-based loss. Furthermore, we propose Cluster-NMS, where NMS during inference is done by implicitly clustering detected boxes and usually requires less iterations. Cluster-NMS is very efficient due to its pure GPU implementation, , and geometric factors can be incorporated to improve both AP and AR. In the experiments, CIoU loss and Cluster-NMS have been applied to state-of-the-art instance segmentation (e.g., YOLACT), and object detection (e.g., YOLO v3, SSD and Faster R-CNN) models. Taking YOLACT on MS COCO as an example, our method achieves performance gains as +1.7 AP and +6.2 AR$_{100}$ for object detection, and +0.9 AP and +3.5 AR$_{100}$ for instance segmentation, with 27.1 FPS on one NVIDIA GTX 1080Ti GPU. All the source code and trained models are available at https://github.com/Zzh-tju/CIoU Full Article
inst Global Distribution of Google Scholar Citations: A Size-independent Institution-based Analysis. (arXiv:2005.03324v1 [cs.DL]) By arxiv.org Published On :: Most currently available schemes for performance based ranking of Universities or Research organizations, such as, Quacarelli Symonds (QS), Times Higher Education (THE), Shanghai University based All Research of World Universities (ARWU) use a variety of criteria that include productivity, citations, awards, reputation, etc., while Leiden and Scimago use only bibliometric indicators. The research performance evaluation in the aforesaid cases is based on bibliometric data from Web of Science or Scopus, which are commercially available priced databases. The coverage includes peer reviewed journals and conference proceedings. Google Scholar (GS) on the other hand, provides a free and open alternative to obtaining citations of papers available on the net, (though it is not clear exactly which journals are covered.) Citations are collected automatically from the net and also added to self created individual author profiles under Google Scholar Citations (GSC). This data was used by Webometrics Lab, Spain to create a ranked list of 4000+ institutions in 2016, based on citations from only the top 10 individual GSC profiles in each organization. (GSC excludes the top paper for reasons explained in the text; the simple selection procedure makes the ranked list size-independent as claimed by the Cybermetrics Lab). Using this data (Transparent Ranking TR, 2016), we find the regional and country wise distribution of GS-TR Citations. The size independent ranked list is subdivided into deciles of 400 institutions each and the number of institutions and citations of each country obtained for each decile. We test for correlation between institutional ranks between GS TR and the other ranking schemes for the top 20 institutions. Full Article
inst Safe Reinforcement Learning through Meta-learned Instincts. (arXiv:2005.03233v1 [cs.LG]) By arxiv.org Published On :: An important goal in reinforcement learning is to create agents that can quickly adapt to new goals while avoiding situations that might cause damage to themselves or their environments. One way agents learn is through exploration mechanisms, which are needed to discover new policies. However, in deep reinforcement learning, exploration is normally done by injecting noise in the action space. While performing well in many domains, this setup has the inherent risk that the noisy actions performed by the agent lead to unsafe states in the environment. Here we introduce a novel approach called Meta-Learned Instinctual Networks (MLIN) that allows agents to safely learn during their lifetime while avoiding potentially hazardous states. At the core of the approach is a plastic network trained through reinforcement learning and an evolved "instinctual" network, which does not change during the agent's lifetime but can modulate the noisy output of the plastic network. We test our idea on a simple 2D navigation task with no-go zones, in which the agent has to learn to approach new targets during deployment. MLIN outperforms standard meta-trained networks and allows agents to learn to navigate to new targets without colliding with any of the no-go zones. These results suggest that meta-learning augmented with an instinctual network is a promising new approach for safe AI, which may enable progress in this area on a variety of different domains. Full Article
inst Trump praises Barr for dropping charges against Flynn By www.inlander.com Published On :: Fri, 08 May 2020 11:06:17 -0700 By Michael Crowley The New York Times Company… Full Article News/Nation & World
inst Best Ski Instructor: Katrin Pardue, Mt. Spokane By www.inlander.com Published On :: Thu, 19 Mar 2020 01:30:00 -0700 [IMAGE-1] Katrin Pardue, as she says it, is "not your average kind of sports person." Pardue's been skiing since she was 2.… Full Article Recreation
inst Trump Fans Protest Against Governors Who Have Imposed Virus Restrictions By www.inlander.com Published On :: Sat, 18 Apr 2020 07:32:00 -0700 By Michael D. Shear and Sarah Mervosh WASHINGTON — President Donald Trump on Friday openly encouraged right-wing protests of social distancing restrictions in states with stay-at-home orders, a day after announcing guidelines for how the nation’s governors should carry out an orderly reopening of their communities on their own timetables.… Full Article News/Nation & World
inst Scanning data streams in real-time against large pattern collections By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Embodiments of the disclosure include a method for partitioning a deterministic finite automaton (DFA) into a plurality of groups. The method includes selecting, with a processing device, a subset of the plurality of states and mapping each state of the subset onto a group of the plurality of groups by assigning one or more transition rules associated with each state to a rule line of the group, wherein each rule line is assigned at most two transition rules and an extended address associated with one of the at most two transition rules. The method also includes iteratively processing each state of the subset mapped onto the group by removing the extended address from each rule line in the group with transition rules referring to a current state if the transition rules in the rule line branch within the group. Full Article
inst Compositions for endodontic instruments By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT A carrier composition for filling a tooth root canal, comprising a cross-linkable material. Full Article
inst Method, apparatus and instructions for parallel data conversions By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT Method, apparatus, and program means for performing a conversion. In one embodiment, a disclosed apparatus includes a destination storage location corresponding to a first architectural register. A functional unit operates responsive to a control signal, to convert a first packed first format value selected from a set of packed first format values into a plurality of second format values. Each of the first format values has a plurality of sub elements having a first number of bits The second format values have a greater number of bits. The functional unit stores the plurality of second format values into an architectural register. Full Article
inst Method, apparatus and instructions for parallel data conversions By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT Method, apparatus, and program means for performing a conversion. In one embodiment, a disclosed apparatus includes a destination storage location corresponding to a first architectural register. A functional unit operates responsive to a control signal, to convert a first packed first format value selected from a set of packed first format values into a plurality of second format values. Each of the first format values has a plurality of sub elements having a first number of bits The second format values have a greater number of bits. The functional unit stores the plurality of second format values into an architectural register. Full Article
inst Method, apparatus and instructions for parallel data conversions By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT Method, apparatus, and program means for performing a conversion. In one embodiment, a disclosed apparatus includes a destination storage location corresponding to a first architectural register. A functional unit operates responsive to a control signal, to convert a first packed first format value selected from a set of packed first format values into a plurality of second format values. Each of the first format values has a plurality of sub elements having a first number of bits The second format values have a greater number of bits. The functional unit stores the plurality of second format values into an architectural register. Full Article
inst Method, apparatus and instructions for parallel data conversions By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT Method, apparatus, and program means for performing a conversion. In one embodiment, a disclosed apparatus includes a destination storage location corresponding to a first architectural register. A functional unit operates responsive to a control signal, to convert a first packed first format value selected from a set of packed first format values into a plurality of second format values. Each of the first format values has a plurality of sub elements having a first number of bits The second format values have a greater number of bits. The functional unit stores the plurality of second format values into an architectural register. Full Article
inst Video player instance prioritization By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A video player instance may be prioritized and decoding and rendering resources may be assigned to the video player instance accordingly. A video player instance may request use of a resource combination. Based on a determined priority a resource combination may be assigned to the video player instance. A resource combination may be reassigned to another video player instance upon detection that the previously assigned resource combination is no longer actively in use. Full Article
inst Interleaving data accesses issued in response to vector access instructions By www.freepatentsonline.com Published On :: Tue, 28 Apr 2015 08:00:00 EDT A vector data access unit includes data access ordering circuitry, for issuing data access requests indicated by elements of earlier and a later vector instructions, one being a write instruction. An element indicating the next data access for each of the instructions is determined. The next data accesses for the earlier and the later instructions may be reordered. The next data access of the earlier instruction is selected if the position of the earlier instruction's next data element is less than or equal to the position of the later instruction's next data element minus a predetermined value. The next data access of the later instruction may be selected if the position of the earlier instruction's next data element is higher than the position of the later instruction's next data element minus a predetermined value. Thus data accesses from earlier and later instructions are partially interleaved. Full Article
inst Methods and apparatus for storing expanded width instructions in a VLIW memory for deferred execution By www.freepatentsonline.com Published On :: Tue, 28 Apr 2015 08:00:00 EDT Techniques are described for decoupling fetching of an instruction stored in a main program memory from earliest execution of the instruction. An indirect execution method and program instructions to support such execution are addressed. In addition, an improved indirect deferred execution processor (DXP) VLIW architecture is described which supports a scalable array of memory centric processor elements that do not require local load and store units. Full Article
inst System and method for Controlling restarting of instruction fetching using speculative address computations By www.freepatentsonline.com Published On :: Tue, 28 Apr 2015 08:00:00 EDT A system and method for controlling restarting of instruction fetching using speculative address computations in a processor are provided. The system includes a predicted target queue to hold branch prediction logic (BPL) generated target address values. The system also includes target selection logic including a recycle queue. The target selection logic selects a saved branch target value between a previously speculatively calculated branch target value from the recycle queue and an address value from the predicted target queue. The system further includes a compare block to identify a wrong target in response to a mismatch between the saved branch target value and a current calculated branch target, where instruction fetching is restarted in response to the wrong target. Full Article
inst Combined branch target and predicate prediction for instruction blocks By www.freepatentsonline.com Published On :: Tue, 28 Apr 2015 08:00:00 EDT Embodiments provide methods, apparatus, systems, and computer readable media associated with predicting predicates and branch targets during execution of programs using combined branch target and predicate predictions. The predictions may be made using one or more prediction control flow graphs which represent predicates in instruction blocks and branches between blocks in a program. The prediction control flow graphs may be structured as trees such that each node in the graphs is associated with a predicate instruction, and each leaf associated with a branch target which jumps to another block. During execution of a block, a prediction generator may take a control point history and generate a prediction. Following the path suggested by the prediction through the tree, both predicate values and branch targets may be predicted. Other embodiments may be described and claimed. Full Article
inst Executing machine instructions comprising input/output pairs of execution nodes By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT A computing machine is disclosed having a memory system for storing a collection of execution nodes, a head for reading a sequence of symbols in the execution nodes in the memory system, and writing a sequence of symbols in the memory system. The machine is configured to execute a computation with a collection of pairs of execution nodes. Each pair of execution nodes represents a machine instruction. One execution node in the pair represents input of the machine instruction represented by the execution nodes. Another execution node in the pair represents output of the machine instruction represented by the execution nodes. Each execution node has a state of the machine, a sequence of symbols and a number. Full Article
inst Detecting and reissuing of loop instructions in reorder structure By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT A processor for processing loop instructions can include an instruction reorder structure and a loop processing controller. The instruction reorder structure is configured to store decoded instructions according to program order and issue the decoded instructions for execution out of program order. The loop processing controller is configured to detect a loop in the decoded instructions stored in the instruction reorder structure and cause the instruction reorder structure to reissue the decoded instructions that form the loop for re-execution. Full Article
inst Instruction execution By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A method of executing an instruction set including a first instruction and a second instruction, includes reading the first instruction; determining whether the first instruction is an instruction which is integral with the second instruction; reading the second instruction; if the first instruction is integral with the second instruction, interpreting the operand field of the second instruction to indicate at least one value to be used in conjunction with at least one bit of the first instruction; and if the first instruction is not integral with the second instruction, interpreting the operand field of the second instruction to indicate an entry of a look-up table. Full Article
inst Efficient conditional ALU instruction in read-port limited register file microprocessor By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A microprocessor having performs an architectural instruction that instructs it to perform an operation on first and second source operands to generate a result and to write the result to a destination register only if its architectural condition flags satisfy a condition specified in the architectural instruction. A hardware instruction translator translates the instruction into first and second microinstructions. To execute the first microinstruction, an execution pipeline performs the operation on the source operands to generate the result. To execute the second microinstruction, it writes the destination register with the result generated by the first microinstruction if the architectural condition flags satisfy the condition, and writes the destination register with the current value of the destination register if the architectural condition flags do not satisfy the condition. Full Article
inst Data mover moving data to accelerator for processing and returning result data based on instruction received from a processor utilizing software and hardware interrupts By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Efficient data processing apparatus and methods include hardware components which are pre-programmed by software. Each hardware component triggers the other to complete its tasks. After the final pre-programmed hardware task is complete, the hardware component issues a software interrupt. Full Article
inst Accessing model specific registers (MSR) with different sets of distinct microinstructions for instructions of different instruction set architecture (ISA) By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A microprocessor capable of running both x86 instruction set architecture (ISA) machine language programs and Advanced RISC Machines (ARM) ISA machine language programs. The microprocessor includes a mode indicator that indicates whether the microprocessor is currently fetching instructions of an x86 ISA or ARM ISA machine language program. The microprocessor also includes a plurality of model-specific registers (MSRs) that control aspects of the operation of the microprocessor. When the mode indicator indicates the microprocessor is currently fetching x86 ISA machine language program instructions, each of the plurality of MSRs is accessible via an x86 ISA RDMSR/WRMSR instruction that specifies an address of the MSR. When the mode indicator indicates the microprocessor is currently fetching ARM ISA machine language program instructions, each of the plurality of MSRs is accessible via an ARM ISA MRRC/MCRR instruction that specifies the address of the MSR. Full Article
inst Storing in other queue when reservation station instruction queue reserved for immediate source operand instruction execution unit is full By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A processing apparatus includes an execution unit which performs computation on two operand inputs each being selectable between read data from a register and an immediate value. The processing apparatus also includes another execution unit which performs computation on two operand inputs, one of which is selectable between read data from a register and an immediate value, and the other of which is an immediate value. A control unit determines, based on a received instruction specifying a computation on two operands, whether each of the two operands specifies read data from a register or an immediate value. Depending on the determination result, the control unit causes one of the execution units to execute the computation specified by the received instruction. Full Article
inst Load/move and duplicate instructions for a processor By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method includes, in a processor, loading/moving a first portion of bits of a source into a first portion of a destination register and duplicate that first portion of bits in a subsequent portion of the destination register. Full Article
inst Generating hardware events via the instruction stream for microprocessor verification By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A processor receives an instruction operation (OP) code from a verification system. The instruction OP code includes instruction bits and forced event bits. The processor identifies a forced event based upon the forced event bits, which is unrelated to an instruction that corresponds to the instruction bits. In turn, the processor executes the forced event. Full Article
inst Enhanced instruction scheduling during compilation of high level source code for improved executable code By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Systems and methods for static code scheduling are disclosed. A method can include receiving an intermediate representation of source code, building a directed acyclic graph (DAG) for the intermediate representation, and creating chains of dependent instructions from the DAG for cluster formation. The chains are merged into clusters and each node in the DAG is marked with an identifier of a cluster it is part of to generate a marked instruction DAG. Instruction DAG scheduling is then performed using information about the clusters to generate an ordered intermediate representation of the source code. Full Article
inst System and method for using state replication between application instances to provide a collaborative desktop environment By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Described herein are systems and methods for enabling a collaborative remote desktop environment. The system includes a computing device and a first application instance that has an application state associated therewith. The first application instance includes, or is associated with, a current state component and application data/data files. The system further includes an application launcher that is used to instantiate a second application instance operating either on the same or on a different computing device. The second application instance similarly has an application state associated therewith and is associated with the application launcher. Upon receiving a request from the second user to interact with the first application instance, the application state and the application data/data files are communicated to the application launcher, and the application launcher instantiates the second application instance so that its state is substantially identical to that of the first application instance. Full Article
inst Single instance buffer cache method and system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Provided is a method and system for reducing duplicate buffers in buffer cache associated with a storage device. Reducing buffer duplication in a buffer cache includes accessing a file reference pointer associated with a file in a deduplicated filesystem when attempting to load a requested data block from the file into the buffer cache. To determine if the requested data block is already in the buffer cache, aspects of the invention compare a fingerprint that identifies the requested data block against one or more fingerprints identifying a corresponding one or more sharable data blocks in the buffer cache. A match between the fingerprint of the requested data block and the fingerprint from a sharable data block in the buffer cache indicates that the requested data block is already loaded in buffer cache. The sharable data block in buffer cache is used instead thereby reducing buffer duplication in the buffer cache. Full Article
inst Prefetch optimizer measuring execution time of instruction sequence cycling through each selectable hardware prefetch depth and cycling through disabling each software prefetch instruction of an instruction sequence of interest By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A prefetch optimizer tool for an information handling system (IHS) may improve effective memory access time by controlling both hardware prefetch operations and software prefetch operations. The prefetch optimizer tool selectively disables prefetch instructions in an instruction sequence of interest within an application. The tool measures execution times of the instruction sequence of interest when different prefetch instructions are disabled. The tool may hold hardware prefetch depth constant while cycling through disabling different prefetch instructions and taking corresponding execution time measurements. Alternatively, for each disabled prefetch instruction in the instruction sequence of interest, the tool may cycle through different hardware prefetch depths and take corresponding execution time measurements at each hardware prefetch depth. The tool selects a combination of hardware prefetch depth and prefetch instruction disablement that may improve the execution time in comparison with a baseline execution time. Full Article
inst Steroids having increased water solubility and resistance against metabolism, and methods for their production By www.freepatentsonline.com Published On :: Tue, 07 Oct 2014 08:00:00 EDT Steroid compounds having increased resistance against metabolism and increased water solubility are disclosed, together with methods for their production. These substances are suitable for the manufacture of pharmaceuticals for the treatment of steroid related or steroid induced CNS disorders and for use in methods of prevention, alleviation or treatment of such disorders. Full Article
inst Soft tissue tech instrument By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT A pair of soft tissue instruments which provide a combination edge profile allowing a single tool to break up fibrous adhesions and massage damaged tissues in order to restore healthy function to muscles, tendons, ligaments and nerves that have been affected by inflammation, injuries or various traumas. The combination edge profile is formed by a double wide radius following the full thickness of the tool similarly as a spherically blunted tangent ogive, including a nose radius covering around 90 degrees of the curved edge; the double specific radius sharpness angle varying from 1 degree near the full tool thickness of the instrument up to around 50 degrees as an average, but reaching around 90 degrees just when it reaches the much smaller tip edge radius. Full Article
inst Utilizing a diluent to lower combustion instabilities in a gas turbine engine By www.freepatentsonline.com Published On :: Tue, 28 Apr 2015 08:00:00 EDT A method of influencing combustion dynamics, including measuring a combustion dynamics parameter, and controlling a diluent flow (26) delivered to a fuel flow (32) upstream of a pilot burner fuel outlet (40) in response to the measured combustion dynamics parameter. Full Article
inst Electronic musical instrument with quantized resistance strings By www.freepatentsonline.com Published On :: Tue, 04 Sep 1990 08:00:00 EDT For reading the frets of a stringed electronic musical instrument, a plurality of resistance wire strings are secured to a nut end and a bridge of the instrument, with the strings superposing in parallel relationship over a plurality of conducting frets mounted on a fingerboard on the instrument. The voltages produced by depressing the strings to the conducting frets, after being inverted and linearized, are quantized to levels representative of the particular frets to obviate the effects of contact resistance, and decision voltage levels are selected so as to account for such contact resistance. To enable the signals to be fed as conventional information through a MIDI channel to a synthesizer for generating frequencies corresponding to the signals, an analog to digital converter is used. The different components, as well as the digitized linearized signals, are selectively controlled and fed, respectively, to a microprocessor. Full Article
inst Optimization of waveform operation in electronic musical instrument By www.freepatentsonline.com Published On :: Tue, 11 Sep 1990 08:00:00 EDT An electronic musical instrument having a number of keys, having tone generators capable of simultaneous tone production, the tone generators being smaller in number than the number of keys. The instrument forms an operation for synthesizing a desired waveform, the operation for synthesizing a desired waveform being performed in a repeating cyclic order with an operation cycle and in which the waveform is transferred to the tone generators and read out therefrom at a rate in accordance with the note of a key being depressed to obtain a desired musical waveform. The device includes a number-of-depressed keys detecting device which counts the number of keys which are actuating the tone generator upon depression. A cycle altering device is provided for changing the operation cycle, as a whole, on the basis of the number of depressed keys, counted by the number-of-depressed keys detecting device. The construction allows for a waveform of a smooth temporal variation to be produced. Full Article
inst Action for a wind instrument By www.freepatentsonline.com Published On :: Tue, 18 Sep 1990 08:00:00 EDT The invention concerns an action (1, 2) for a wind instrument, comprising keys (6) pivoted turnably relative to the body (3) of the instrument, holes (5) in the body being openable and closable with said keys according to the player's operation for producing notes of different pitch. A key action of this kind is found e.g. on the flute and on other woodwinds. As taught by the invention, the action comprises keys (6) which have been provided with magnets (12) so that the magnet returns the key that has turned into its initial position when the player ceases to press the key or the touch acting thereon. The keys (6) may be open keys which stay open by effect of mutually repulsing magnets (12) and close when pressed by the player against the repulsion of the magnets, or closed keys which are kept closed by mutually attracting magnets and open when pressed against the attraction of the magnets by the player, by touches connected with the keys. Full Article
inst Tuning method and apparatus for keyboard musical instrument By www.freepatentsonline.com Published On :: Tue, 25 Sep 1990 08:00:00 EDT A tuning apparatus for a keyboard musical instrument, having a load applicator for applying a load of a predetermined value to a string set up in place, a calculating device for calculating a deviation between a displacement value of the string produced when the load is applied to the string and a preset value of displacement predetermined to give a required frequency of vibration, and a rotating device for turning a tuning pin until the deviation calculated by the calculating device is reduced to zero. Full Article
inst Electronic musical instrument By www.freepatentsonline.com Published On :: Tue, 30 Oct 1990 08:00:00 EST Root and type of a chord are discriminated at discriminators in accordance with the operation status on a fingerboard. The chord is designated according to a simplified fingering rule predetermined on the fingerboard so as to designate the chord. An automatic accompaniment or a manual play is performed according to the discriminated chord obtained at chord discriminating device. Full Article
inst Electronic musical instrument By www.freepatentsonline.com Published On :: Tue, 06 Nov 1990 08:00:00 EST In an electronic musical instrument of the waveshape memory type including at least one waveshape memory for storing and reproducing sample values of a musical sound wave to be generated, the waveshape memory stores the sample values of the complete waveshape of a musical tone with a shaped envelope. Full Article
inst Structure of rotary valve assembly used in wind instrument By www.freepatentsonline.com Published On :: Tue, 20 Nov 1990 08:00:00 EST A rotary valve assembly incorporated in a brass instrument for changing a pitch of a tone comprises a rotary valve housed in a valve casing having two groups of aeroports, and the rotary valve is provided with two air passages, one of which interconnects the aeroports in the first group and the other of which interconnects one aeroport of the first group and one aeroport of the second group, so that various arrangements are possible for the aeroports. Full Article
inst Tone information processing device for an electronic musical instrument By www.freepatentsonline.com Published On :: Tue, 20 Nov 1990 08:00:00 EST External sound signal coupled through a MIC IN terminal is fed through an operating switch panel section to an A/D converter for conversion to a digital signal. The digital signal is stored in a record memory through a waveform R/W controller under the control of a CPU. The digital signal stored in the record memory is read out from the CPU according to control data stored in a work memory to be fed to an external sound system for sounding. Full Article
inst Rotary valves for brass wind instruments By www.freepatentsonline.com Published On :: Tue, 27 Nov 1990 08:00:00 EST A rotary valve for brass wind instruments with improved lubricating and durability properties is provided. The valve body 2 or both the valve body 2 and casing 1 of the rotary valve comprise(s) a machinable ceramic-resin composite material. The rotary valve can be readily produced by a method which comprises impregnating a machinable ceramic article containing substantially continuous micropores with a liquid resin material and hardening the resin material; machine-processing the resulting machinable ceramic-resin composite article into a shape of the valve body or shapes of the valve body and casing; and assembling the valve body into a rotary valve having the valve body 2 of the composite material rotatably contained in the casing 1 of the composite material or a metal material. Full Article
inst System for controlling output of electronic musical instrument By www.freepatentsonline.com Published On :: Tue, 27 Nov 1990 08:00:00 EST The inventive system comprising a memory for storing the ADSR data, a clock controller for selecting the clock pulses, a counter for counting the output of the clock controller, a data switching means for buffering the output data of the memory, a holding means for holding the output of the data switching means, a comparator for comparing the output of the memory with the output of the holding means, and main controller. The main controller inputs a control signal to control the data access time in the memory and the outputs of the switching means and holding means. According to the present invention, the release data are outputted immediately after the putting off of the keyboard signal to produce more accurate ADSR data. Full Article
inst Electronic musical instrument By www.freepatentsonline.com Published On :: Tue, 04 Dec 1990 08:00:00 EST In an electronic musical instrument of the waveshape memory type including at least one waveshape memory for storing and reproducing sample values of a musical sound wave to be generated, the waveshape memory stores the sample values of the complete waveshape of a musical tone with a shaped envelope. Full Article