computer Oil crash busted broker’s computers and inflicted big losses By economictimes.indiatimes.com Published On :: 2020-05-09T12:32:34+05:30 What he didn’t know was oil’s first trip into negative pricing had broken Interactive Brokers Group Inc. Full Article
computer CSSplay - CSS only tic-tac-toe Player v Computer By www.cssplay.co.uk Published On :: 2015-02-26 A CSS only version of tic-tac-toe for Player v Computer demonstating the use of :matches pseudo-class. Full Article
computer There is no longer any such thing as Computer Security By blog.codinghorror.com Published On :: Fri, 21 Sep 2018 09:50:53 GMT Remember "cybersecurity"? Mysterious hooded computer guys doing mysterious hooded computer guy .. things! Who knows what kind of naughty digital mischief they might be up to? Unfortunately, we now live in a world where this kind of digital mischief is literally rewriting the world's history. For proof of that, Full Article
computer The Cloud Is Just Someone Else's Computer By blog.codinghorror.com Published On :: Sun, 17 Feb 2019 02:15:26 GMT When we started Discourse in 2013, our server requirements were high: 1GB RAM modern, fast dual core CPU speedy solid state drive with 20+ GB I'm not talking about a cheapo shared cpanel server, either, I mean a dedicated virtual private server with those specifications. We were OK with that, Full Article
computer Illustrator Tutorial: How to Create a Simple Computer Icon By feedproxy.google.com Published On :: Fri, 12 Apr 2019 14:50:36 +0000 In today’s tutorial, we're going to take a close look behind the process of creating a simple computer icon, and see how easy it is to build one of our one using nothing more than some basic geometric shapes. 1. Set Up a New Project File As with any new project, we’re going to kick […] The post Illustrator Tutorial: How to Create a Simple Computer Icon appeared first on Bittbox. Full Article How To Illustrator adobe illustrator computer icon Featured flat icon icon Vector vector icon
computer Talking to computers (part 1): Why is speech recognition so difficult? By feedproxy.google.com Published On :: Thu, 3 Jun 2019 08:31:15 GMT Although the performance of today's speech recognition systems is impressive, the experience for many is still one of errors, corrections, frustration and abandoning speech in favour of alternative interaction methods. We take a closer look at speech and find out why speech recognition is so difficult. Full Article
computer Talking to computers (part 2): VUI as an error recovery system By feedproxy.google.com Published On :: Mon, 1 Jul 2019 08:21:51 GMT I take a closer look at some unavoidable challenges to effective speech recognition, and I discuss why you may want to think twice before designing dialogue that is 'conversational' and 'natural'. I also offer five important questions that I think should form the basis of any VUI design kick-off meeting. Full Article
computer Google Lens now copies handwritten text and pastes it straight to your computer By feedproxy.google.com Published On :: Thu, 07 May 2020 19:59:08 +0000 Are there still folks among you who, like me, prefer handwriting to typing? If you’re in this group, you’ll love this new feature on Google Lens. The app now lets you scan your handwritten notes, copy them, and paste them straight to your computer. I gave it a spin, and I bring you my impressions […] The post Google Lens now copies handwritten text and pastes it straight to your computer appeared first on DIY Photography. Full Article news AI Artificial Intelligence Google AI Google Lens hadwriting handwritten
computer Transfer Learning for EEG-Based Brain-Computer Interfaces: A Review of Progress Made Since 2016. (arXiv:2004.06286v3 [cs.HC] UPDATED) By arxiv.org Published On :: A brain-computer interface (BCI) enables a user to communicate with a computer directly using brain signals. Electroencephalograms (EEGs) used in BCIs are weak, easily contaminated by interference and noise, non-stationary for the same subject, and varying across different subjects and sessions. Therefore, it is difficult to build a generic pattern recognition model in an EEG-based BCI system that is optimal for different subjects, during different sessions, for different devices and tasks. Usually, a calibration session is needed to collect some training data for a new subject, which is time consuming and user unfriendly. Transfer learning (TL), which utilizes data or knowledge from similar or relevant subjects/sessions/devices/tasks to facilitate learning for a new subject/session/device/task, is frequently used to reduce the amount of calibration effort. This paper reviews journal publications on TL approaches in EEG-based BCIs in the last few years, i.e., since 2016. Six paradigms and applications -- motor imagery, event-related potentials, steady-state visual evoked potentials, affective BCIs, regression problems, and adversarial attacks -- are considered. For each paradigm/application, we group the TL approaches into cross-subject/session, cross-device, and cross-task settings and review them separately. Observations and conclusions are made at the end of the paper, which may point to future research directions. Full Article
computer A Review of Computer Vision Methods in Network Security. (arXiv:2005.03318v1 [cs.NI]) By arxiv.org Published On :: Network security has become an area of significant importance more than ever as highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure, and malware/ransomware/cryptojacker attacks that are reported almost every day. Increasingly, we are relying on networked infrastructure and with the advent of IoT, billions of devices will be connected to the internet, providing attackers with more opportunities to exploit. Traditional machine learning methods have been frequently used in the context of network security. However, such methods are more based on statistical features extracted from sources such as binaries, emails, and packet flows. On the other hand, recent years witnessed a phenomenal growth in computer vision mainly driven by the advances in the area of convolutional neural networks. At a glance, it is not trivial to see how computer vision methods are related to network security. Nonetheless, there is a significant amount of work that highlighted how methods from computer vision can be applied in network security for detecting attacks or building security solutions. In this paper, we provide a comprehensive survey of such work under three topics; i) phishing attempt detection, ii) malware detection, and iii) traffic anomaly detection. Next, we review a set of such commercial products for which public information is available and explore how computer vision methods are effectively used in those products. Finally, we discuss existing research gaps and future research directions, especially focusing on how network security research community and the industry can leverage the exponential growth of computer vision methods to build much secure networked systems. Full Article
computer Spokane Comedy Club bringing the laughs from Dan Cummins, Spokane's Kelsey Cook and more right to your computer this weekend By www.inlander.com Published On :: Fri, 24 Apr 2020 15:07:18 -0700 The Spokane Comedy Club might be quiet right now, but there are still laughs to be had on Zoom, and not just from watching your co-workers try to navigate the online meeting platform. Saturday night, and again next Saturday, the comedy club is hosting Comedians Doing Comedy: A Virtual Comedy Show.… Full Article Arts & Culture
computer Wearable electromyography-based human-computer interface By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A “Wearable Electromyography-Based Controller” includes a plurality of Electromyography (EMG) sensors and provides a wired or wireless human-computer interface (HCI) for interacting with computing systems and attached devices via electrical signals generated by specific movement of the user's muscles. Following initial automated self-calibration and positional localization processes, measurement and interpretation of muscle generated electrical signals is accomplished by sampling signals from the EMG sensors of the Wearable Electromyography-Based Controller. In operation, the Wearable Electromyography-Based Controller is donned by the user and placed into a coarsely approximate position on the surface of the user's skin. Automated cues or instructions are then provided to the user for fine-tuning placement of the Wearable Electromyography-Based Controller. Examples of Wearable Electromyography-Based Controllers include articles of manufacture, such as an armband, wristwatch, or article of clothing having a plurality of integrated EMG-based sensor nodes and associated electronics. Full Article
computer Avoiding processing flaws in a computer processor triggered by a predetermined sequence of hardware events By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system, method and computer program product for avoiding a processing flaw in a computer processor triggered by a predetermined sequence of hardware events. The system may include a detecting unit and a power-on reset unit. The detecting unit detects that the predetermined sequence of hardware events is going to occur at the computer processor. The power-on reset unit initializes the computer processor to a state stored in computer memory in response to detecting the sequence of hardware events. Full Article
computer Preventing disturbance induced failure in a computer system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method to prevent failure on a server computer due to internally and/or externally induced shock and/or vibration. The method includes acquiring, by at least one sensor, analog acceleration data of components in a server computer. The data is then converted to digital format and stored within a motor drive assembly processor memory unit. The processor analyzes the stored data for existence of machine degradation. In response to detecting the existence of machine degradation, the motor drive assembly processor initiates remediation procedures. The remediation procedures include controlling rotating speed of moving devices or performing a complete system shut down. Full Article
computer Computer and data saving method By www.freepatentsonline.com Published On :: Tue, 11 Aug 2015 08:00:00 EDT It is provided a computer comprising a nonvolatile memory for storing data, a control processor for controlling the saving of data into the nonvolatile memory, and a battery for supplying power to the computer in case of a failure of an external power supply, wherein the control processor checks a charge amount stored in the battery, calculates an amount of data which can be saved in the nonvolatile memory by the battery in case of a failure of the external power supply based on the checked charge amount, and saves data excluding the amount of data that can be saved, out of data which should be saved into the nonvolatile memory, into the nonvolatile memory in advance. Full Article
computer Technique for communicating interrupts in a computer system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A technique to enable efficient interrupt communication within a computer system. In one embodiment, an advanced programmable interrupt controller (APIC) is interfaced via a set of bits within an APIC interface register using various interface instructions or operations, without using memory-mapped input/output (MMIO). Full Article
computer Data transfer control apparatus, data transfer control method, and computer product By www.freepatentsonline.com Published On :: Tue, 18 Aug 2015 08:00:00 EDT A data transfer control apparatus includes a transferring unit that transfers data from a transfer source memory to a transfer destination memory, according to an instruction from a first processor; and a first processor configured to detect a process execute by the first processor, determine whether transfer of the data is urgent, based on the type of the detected process, and control the transferring unit or the first processor to transfer the data, based on a determination result. Full Article
computer System and method for managing mainframe computer system usage By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT In mainframe computer system, workload tasks are accomplished using a logically partitioned data processing system, where the partitioned data processing system is divided into multiple logical partitions. In a system and method managing such a computer system, each running workload tasks that can be classified based on time criticality, and groups of logical partitions can be freely defined. Processing capacity limits for the logical partitions in a group of logical partitions based upon defined processing capacity thresholds and upon an iterative determination of how much capacity is needed for time critical workload tasks. Workload can be balanced between logical partitions within a group, to prevent surplus processing capacity being used to run not time critical workload on one logical partition when another logical partition running only time critical workload tasks faces processing deficit. Full Article
computer Parallel computer system and program By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT There is provided a parallel computer system for performing barrier synchronization using a master node and a plurality of worker nodes based on the time to allow for an adaptive setting of the synchronization time. When a task process in a certain worker node has not been completed by a worker determination time, the particular worker node performs a communication to indicate that the process has not been completed, to a master node. When the communication has been received by a master determination time, the master node performs a communication to indicate that the process time is extended by a correction process time, in order to adjust and extend the synchronization time. In this way, it is possible to reduce the synchronization overhead associated with the execution of an application with a relatively large variation in the process time from a synchronization point to the next synchronization point. Full Article
computer ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***Data transfer control apparatus, data transfer control method, and computer product By www.freepatentsonline.com Published On :: Tue, 30 Jun 2015 08:00:00 EDT A data transfer control apparatus includes a transferring unit that transfers data from a transfer source memory to a transfer destination memory, according to an instruction from a first processor; and a first processor configured to detect a process execute by the first processor, determine whether transfer of the data is urgent, based on the type of the detected process, and control the transferring unit or the first processor to transfer the data, based on a determination result. Full Article
computer Method for activating processor cores within a computer system By www.freepatentsonline.com Published On :: Tue, 05 May 2015 08:00:00 EDT A technique for activating processor cores within a computer system is disclosed. Initially, a value representing a number of processor cores to be enabled within the computer system is received. The computer system includes multiple processors, and each of the processors includes multiple processor cores. Next, a scale variable value representing a specific type of tasks to be optimized during an execution of the tasks within the computer system is received. From a pool of available processor cores within the computer system, a subset of processor cores can be selected for activation. The subset of processor cores is activated in order to achieve system optimization during an execution of the tasks. Full Article
computer Recovering from an error in a fault tolerant computer system By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A leading thread and a trailing thread are executed in parallel. Assuming that no transient fault occurs in each section, a system is speculatively executed in the section, with the leading thread and the trailing thread preferably being assigned to two different cores. At this time, the leading thread and the trailing thread are simultaneously executed, performing a buffering operation on a thread local area without performing a write operation on a shared memory. When the respective execution results of the two threads match each other, the content buffered to the thread local area is committed and written to the shared memory. When the respective execution results of the two threads do not match each other, the leading thread and the trailing thread are rolled back to a preceding commit point and re-executed. Full Article
computer Method for activating processor cores within a computer system By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT A method for activating processor cores within a computer system is disclosed. Initially, a value representing a number of processor cores to be enabled within the computer system is received. The computer system includes multiple processors, and each of the processors includes multiple processor cores. Next, a scale variable value representing a specific type of tasks to be optimized during an execution of the tasks within the computer system is received. From a pool of available processor cores within the computer system, a subset of processor cores can be selected for activation. The subset of processor cores is activated in order to achieve system optimization during an execution of the tasks. Full Article
computer System, method and computer program product for recursively executing a process control operation to use an ordered list of tags to initiate corresponding functional operations By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT In accordance with embodiments, there are provided mechanisms and methods for controlling a process using a process map. These mechanisms and methods for controlling a process using a process map can enable process operations to execute in order without necessarily having knowledge of one another. The ability to provide the process map can avoid a requirement that the operations themselves be programmed to follow a particular sequence, as can further improve the ease by which the sequence of operations may be changed. Full Article
computer Method, apparatus and computer program for determining the location of a user in an area By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Apparatus for orientating a user in a space wherein the space comprises a plurality of zones of which only certain zones constitute functional zones wherein each functional zone includes a first type device containing information relating to the position of the zone in the space and wherein the first type device is reactive to the presence of a second type device associated with the user to provide the user with the information to determine the orientation of the user in the space. A method of orientating the user within the space and guiding the user toward one or more features in the space is also disclosed. Full Article
computer Dive computer incorporating stored dive site information By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Dive computers in accordance with embodiments of the invention are disclosed that store information concerning a dive site. The stored information can be accessed during the dive to provide information concerning such things as points of interest and/or hazards. One embodiment of the invention includes a processor, memory connected to the processor, a pressure transducer connected to the processor and configured to measure depth, and a display connected to the processor. In addition, the memory contains factual information concerning a dive site, and the processor is configured to display at least a portion of the stored factual information concerning the dive site via the display. Full Article
computer Circuit design support method, computer product, and circuit design support apparatus By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A circuit-design support method includes obtaining information for a circuit having a logic circuit in which signal lines are connected to input terminals, signals of the signal lines being output via the logic circuit; obtaining information concerning a control circuit that has a first flip-flop for scanning and that can control a value of a given signal line by a value set by the first flip-flop; selecting, based on the circuit information, a second flip-flop at an output destination of a signal from the logic circuit, among second flip-flops of the circuit; and generating, based on the control circuit information, information indicating a serial connection of the control circuit between an output source of the signal of the given signal line and the given signal line and a connection of a data input terminal of the first flip-flop and an output terminal of the selected second flip-flop. Full Article
computer Audio encoder, audio decoder, methods for encoding and decoding an audio signal, and a computer program By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An encoder for providing an audio stream on the basis of a transform-domain representation of an input audio signal includes a quantization error calculator configured to determine a multi-band quantization error over a plurality of frequency bands of the input audio signal for which separate band gain information is available. The encoder also includes an audio stream provider for providing the audio stream such that the audio stream includes information describing an audio content of the frequency bands and information describing the multi-band quantization error. A decoder for providing a decoded representation of an audio signal on the basis of an encoded audio stream representing spectral components of frequency bands of the audio signal includes a noise filler for introducing noise into spectral components of a plurality of frequency bands to which separate frequency band gain information is associated on the basis of a common multi-band noise intensity value. Full Article
computer Audio signal decoder, time warp contour data provider, method and computer program By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An audio signal decoder has a time warp contour calculator, a time warp contour data rescaler and a warp decoder. The time warp contour calculator is configured to generate time warp contour data repeatedly restarting from a predetermined time warp contour start value, based on time warp contour evolution information describing a temporal evolution of the time warp contour. The time warp contour data rescaler is configured to rescale at least a portion of the time warp contour data such that a discontinuity at a restart is avoided, reduced or eliminated in a rescaled version of the time warp contour. The warp decoder is configured to provide the decoded audio signal representation, based on an encoded audio signal representation and using the rescaled version of the time warp contour. Full Article
computer Method, system, and computer readable medium for creating clusters of text in an electronic document By www.freepatentsonline.com Published On :: Tue, 21 Jul 2015 08:00:00 EDT Disclosed herein are systems and methods for navigating electronic texts. According to an aspect, a method may include determining text subgroups within an electronic text. The method may also include selecting a text seed within one of the text subgroups. Further, the method may include determining a similarity relationship between the text seed and one or more adjacent text subgroups that do not include the selected text seed. The method may also include associating the text seed with the one or more adjacent text subgroups based on the similarity relationship to create a text cluster. Full Article
computer Time warp contour calculator, audio signal encoder, encoded audio signal representation, methods and computer program By www.freepatentsonline.com Published On :: Tue, 29 Mar 2016 08:00:00 EDT A time warp contour calculator for use in an audio signal decoder receives an encoded warp ratio information, derives a sequence of warp ratio values from the encoded warp ratio information, and obtains warp contour node values starting from a time warp contour start value. Ratios between the time warp contour node values and the time warp contour starting value are determined by the warp ratio values. The time warp contour calculator computes a time warp contour node value of a given time warp contour node, on the basis of a product-formation having a ratio between the time warp contour node values of the intermediate time warp contour node and the time warp contour starting value and a ratio between the time warp contour node values of the given time warp contour node and of the intermediate time warp contour node as factors. Full Article
computer Method for configuring displets for an interactive platform for analyzing a computer network performance By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method for configuring an interactive platform for monitoring the performance and the quality of a computer network, the monitoring data being suitable to be displayed on a dynamic page of type webpage in a form of graphic components called “displets”; including providing, on the interactive platform a configuration interface in which are defined, for at least one given user, filtering criteria for displaying displets, the criteria being defined in the form of parameters for configuring the rights of the at least one user. Full Article
computer Data processing apparatus, data processing method of data processing apparatus, and computer-readable memory medium storing program therein By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT To freely establish a peripheral equipment selection operating environment of excellent operability which can remarkably reduce an operation burden which is applied until construction information of selectable peripheral equipment can be confirmed and can easily confirm the construction information of the selectable peripheral equipment by everyone by a simple operating instruction, a CPU obtains construction information of a printer that is being selected and default setting on the basis of a selection instructing state relative to a selectable printer candidate on a network and allows them to be caption-displayed at a position near the position indicated by a cursor on a printer selection picture plane displayed on a CRT. Full Article
computer Detecting automated identities in computer user communities By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A computer-implemented method of detecting automated identities, including. The method includes, using one or more computing devices, providing for display to a user a first representation of a first profile for a first identity and a second representation of a second profile for a second identity, providing for display to the user a choice indication mechanism for indicating a judgment about the first representation of the first profile for the first identity and the second representation of the second profile for the second identity, receiving an indication of the judgment from the user about the first representation of the first profile for the first identity and the second representation of the second profile for the second identity, and determining whether at least one of the first identity, the second identity, or the user is more or less likely to be automated, based at least in part on the received indication. Full Article
computer Printing device, mobile terminal, and computer readable recording medium for the same By www.freepatentsonline.com Published On :: Tue, 02 Jun 2015 08:00:00 EDT A printing device includes a printing device side wireless communication unit configured to execute wireless communication with a mobile terminal, an operation acquisition unit configured to acquire user operation thereof, and a processor. The processor is configured to acquire operation data which is generated as the operation acquisition unit acquires a user operation, acquire establishment data which is generated as the printing device side wireless communication unit establishes a wireless communication with the mobile terminal, and issue a request control to control the printing device side wireless communication unit to transmit request data requesting the mobile terminal to transmit print data necessary for printing, via the wireless communication, when the establishment data is acquired, the request control being issued in accordance with the operation data as acquired. Full Article
computer Power supply control system, method, and computer program product By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT According to an embodiment, a control system includes a detector, an estimating unit, a determining unit, and a controller. The detector detects an idle state. The estimating unit estimates an idle period. When the idle state is detected, the determining unit determines whether a first power consumption when writeback of data which needs to be written back to a main storage device is performed and supply of power to a cache memory is stopped, is larger than a second power consumption when writeback of the data is not performed and supply of power is continued for the idle period. The controller stops the supply of power to the cache memory when the first power consumption is determined to be smaller than the second power consumption and continues the supply of power when the first power consumption is determined to be larger than the second power consumption. Full Article
computer Methods, systems, apparatuses, and computer-readable media for waking a SLIMbus without toggle signal By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Arrangements for restarting data transmission on a serial low-power inter-chip media bus (SLIMbus) are presented. A clock signal may be provided in an active mode to a component communicatively coupled with the SLIMbus. Immediately prior to the clock signal in the active mode being provided, the clock signal may have been in a paused mode. While the clock signal was in the paused mode at least until the clock signal is provided in the active mode, the data line may have been inactive (e.g., a toggle on the data line may not have been present). Frame synchronization data for a frame may be transmitted. The frame synchronization data for the frame, as received by the component, may not match expected frame synchronization data. Payload data may be transmitted as part of the frame to the component, wherein the payload data is expected to be read properly by the component. Full Article
computer Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method By www.freepatentsonline.com Published On :: Tue, 22 Sep 2015 08:00:00 EDT A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in the client computers, and being partitioned into multiple relational databases each one of which is assigned to one set of the sets of client computers. Each database further storing encrypted data items, each data item being encrypted with one of the user or user-group specific cryptographic keys, the key identifier of the cryptographic key with which one of the data items is encrypted being stored in the database as an attribute of the one of the encrypted data items. The log-in component comprising assignment information indicative of the assignment of the databases to the set of client computers. Full Article
computer MRI-guided localization and/or lead placement systems, related methods, devices and computer program products By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT MRI compatible localization and/or guidance systems for facilitating placement of an interventional therapy and/or device in vivo include: (a) a mount adapted for fixation to a patient; (b) a targeting cannula with a lumen configured to attach to the mount so as to be able to controllably translate in at least three dimensions; and (c) an elongate probe configured to snugly slidably advance and retract in the targeting cannula lumen, the elongate probe comprising at least one of a stimulation or recording electrode. In operation, the targeting cannula can be aligned with a first trajectory and positionally adjusted to provide a desired internal access path to a target location with a corresponding trajectory for the elongate probe. Automated systems for determining an MR scan plane associated with a trajectory and for determining mount adjustments are also described. Full Article
computer Methods, systems, and computer readable media for monitored application of mechanical force to samples using acoustic energy and mechanical parameter value extraction using mechanical response models By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods, systems, and computer readable media for monitored application of mechanical force to samples using acoustic energy and mechanical parameter value extraction using mechanical response models can be used for determining mechanical property parameters of a sample. An exemplary method includes applying acoustic energy to a sample to apply a mechanical force to the sample, measuring a response by the sample during the application of the acoustic energy, measuring a recovery response of the sample following cessation of the application of the acoustic energy, and determining a value for at least one additional mechanical property parameter of the sample based on the response measured during application of the acoustic energy and the recovery response measured following cessation of the application of acoustic energy. Full Article
computer Computer simulation of fluid flow and acoustic behavior By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A computer-implemented method for simulating flow and acoustic interaction of a fluid with a porous medium includes simulating activity of a fluid in a first volume adjoining a second occupied by a porous medium, the activity of the fluid in the first volume being simulated so as to model movement of elements within the first volume and using a first model having a first set of parameters, simulating activity of the fluid in the second volume occupied by the porous medium, the activity in the second volume being simulated so as to model movement of elements within the second volume and using a second model having a second set of parameters and differing from the first model in a way that accounts for flow and acoustic properties of the porous medium, and simulating movement of elements between the first volume and the second volume at an interface between the first volume and the second volume. Full Article
computer Computer system, program, and method for assigning computational resource to be used in simulation By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT The cost necessary for introducing and maintaining a development environment that includes multiple simulators is suppressed, and a sharing of designing information is promoted, to make parameter adjustment of simulators easy. Provided is a service that unifies development environment on a computer provided with: a working computer system that can guarantee that there is no leaking of designing files; a user behavior monitoring system that collects utilization history of simulators or software, for each of the users, and selects development process of each of the users from the collected information; and a dynamic computational-resource distribution system that can conduct an automatic optimization of a complex simulation configuration, from information collected by the aforementioned user behavior monitoring system. Full Article
computer Method for computer-aided closed-loop and/or open-loop control of a technical system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method for computer-aided closed and/or open-loop control of a technical system is provided. A first value of an output quantity is predicted on a data-based model at a current point in time. A second value of the output quantity is determined from an analytical model. The state of the technical system at the current point is assigned a confidence score in the correctness of prediction of the data-based model. A third value of the output quantity is determined from the first and second value as a function of the confidence score for controlling the technical system. A suitable value for the output quantity can be derived from the analytical model even for regions of the technical system in which the quality of prediction of the data-based model is low because of a small set of training data. The technical systems can be turbines, such as gas turbines. Full Article
computer Computer-implemented systems and methods for testing large scale automatic forecast combinations By www.freepatentsonline.com Published On :: Tue, 02 Jun 2015 08:00:00 EDT Systems and methods are provided for evaluating performance of forecasting models. A plurality of forecasting models may be generated using a set of in-sample data. Two or more forecasting models from the plurality of forecasting models may be selected for use in generating a combined forecast. An ex-ante combined forecast may be generated for an out-of-sample period using the selected two or more forecasting models. The ex-ante combined forecast may then be compared with a set of actual out-of-sample data to evaluate performance of the combined forecast. Full Article
computer Methods, systems, and computer readable media for simulating realistic movement of user equipment in a long term evolution (LTE) network By www.freepatentsonline.com Published On :: Tue, 01 Sep 2015 08:00:00 EDT Methods, systems, and computer readable media for simulating realistic movement of user equipment in an LTE network are disclosed. According to one method, a logical topology of a long term evolution (LTE) access network is defined that includes defining connections between one or more eNodeBs (eNBs). A physical topology of the LTE access network is defined that includes defining locations of the eNBs and sectors, where the physical network topology is mapped to the logical network topology. One or more problem areas are defined within the physical network topology, where the one or more problem areas include locations where signal quality is degraded. One or more paths are defined through the physical network topology. A traffic profile for a user equipment (UE) device is defined. A plurality of messages is generated for simulating the movement of a UE device along a path through the physical network topology. Full Article
computer Dynamically configuring and verifying routing information of broadcast networks using link state protocols in a computer network By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A technique dynamically configures and verifies routing information of broadcast networks using link state protocols in a computer network. According to the novel technique, a router within the broadcast network receives a link state protocol routing information advertisement from an advertising router, e.g., a designated router or other adjacent neighbor. The router learns of a next-hop router (“next-hop”) to reach a particular destination from the advertisement, and determines whether the next-hop is located within the same broadcast network (e.g., subnet) as the designated router. If so, the router further determines whether the next-hop is directly addressable (i.e., reachable), such as, e.g., by checking for link adjacencies to the next-hop or by sending request/reply messages (e.g., echo messages or “ping” messages) to the next-hop. In the event the next-hop for the destination is not directly addressable by the router (e.g., no adjacency or reply), the router installs a route to the destination via the designated router. Otherwise, the router installs a route to the destination via the next-hop. Full Article
computer Information processing apparatus, computer-readable recording medium, and control method By www.freepatentsonline.com Published On :: Tue, 23 Jun 2015 08:00:00 EDT An abnormality detection unit provided in at least one node among a plurality of nodes included in an information processing apparatus detects abnormality in a data transmission path of data transmission using a shared memory area sharable in a single node and other node, which is included in the storage unit provided in the single node or other nodes. An error information generation unit provided in the single node generates error information, based on the abnormality detected by the abnormality detection unit, and generates an interrupt with respect to a processor within a self node. The processor provided in the single node performs recovery processing, based on the error information according to the interrupt. Full Article
computer Shaping machine system and computer program for controlling a shaping device By www.freepatentsonline.com Published On :: Tue, 03 Jun 2014 08:00:00 EDT A shaping machine system including a shaping device and a computer is provided. The shaping device includes at least one jig mount body configured for mounting a jig; a shaping tool support body configured for supporting a shaping tool; a first drive device configured for rotating the shaping tool; and a second drive device configured for driving the shaping tool support body or the at least one jig mount body or changing a posture of the shaping tool relative to the workpiece. The computer is configured for controlling the first and second drive devices according to predetermined shaping data. The computer includes a jig position measuring unit configured for measuring a position of the jig; a position error detecting unit configured for detecting a position error of the jig, and a shaping data correcting unit configured for correcting the predetermined shaping data according to a jig position error. Full Article
computer Methods, systems, and computer readable media for measuring multicast latency By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods, systems, and computer readable media for measuring multicast latency are disclosed. According to one method, the method includes emulating one or more Internet protocol television (IPTV) user devices by generating channel leave and join requests. The method further includes monitoring network responses to the channel leave and join requests and calculating, during a cycle of channel leave and join requests for a user device and prior to repeating the cycle, at least one metric of latency associated with the channel leave and join requests. Full Article
computer Methods, devices, and computer program products for providing instant messaging in conjunction with an audiovisual, video, or audio program By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods, devices, and computer program products for providing instant messaging in conjunction with an audiovisual, video, or audio program are provided. The methods include providing an audiovisual, video, or audio program to a user. Viewer/listener input is received requesting activation of a program-based instant messaging function. A viewer/listener identifier corresponding to the viewer/listener is associated with a program identifier that uniquely identifies the audiovisual, video, or audio program being provided to the user to thereby generate a program viewer/listener record. The program viewer/listener record is transmitted to an electronic database. A list of other users who are viewing or listening to the program in addition to the viewer/listener is acquired from the electronic database. The list of other users is transmitted to the viewer/listener. Full Article