Creat membership Creat membership
Sign in

Forgot password?

Confirm
  • Forgot password?
    Sign Up
  • Confirm
    Sign In
home > search

Now showing items 65 - 80 of 1319

  • Method and device for controlling operation of inverter

    Provided are a method and a device for controlling an operation of an inverter. The method includes: determining whether a direct current side voltage of the inverter is greater than an operation voltage setting threshold; and if no, controlling the inverter to operate according to a five level control strategy; and if yes: adjusting the direct current side voltage by using a maximum power tracking algorithm; adjusting linearly a floating capacitor voltage of the inverter based on the adjusted direct current side voltage; determining whether the adjusted floating capacitor voltage is in a preset range; and if yes, controlling the inverter to operate according to a five level control strategy; and if no, controlling the inverter to operate according to a seven level control strategy.
    Download Collect
  • Systems and methods for identifying cosmetic agents for hair/scalp care compositions

    Provided are methods and systems for determining functional relationships between a cosmetic agent and a hair biology condition of interest. Also provided are methods and systems for identifying cosmetic agents that affect a hair biology condition, as well as the use of agents identified by such methods and systems for the preparation of cosmetic compositions, personal care products, or both.
    Download Collect
  • Semiconductor structure and method for forming the same

    A semiconductor structure is provided, comprising: a Si substrate; a porous structure layer formed on the Si substrate, in which the porous structure layer has a flat surface and comprises a Si1-xGex layer with low Ge content; and a Ge-containing layer formed on the porous structure layer, in which the Ge containing layer comprises a Ge layer or a Si1-yGey layer with high Ge content and x≦y. Further, a method for forming the semiconductor structure is also provided.
    Download Collect
  • Migration of large data from on-line content management to archival content management

    A method for content management in a file system includes creating a file system storage device with a storage area symbolic name. A core table data structure is generated including a core table partition field. An ancillary table data structure is generated including an ancillary table partition field. Partitioning rules for the file system storage device are cached based on the storage area symbolic name. Property values for a document are compared with the cached partitioning rules to determine a match for the storage area symbolic name. The document is stored into a partition of the file system storage device based on the storage area symbolic name. Metadata for the document is stored into a partition of the core table based on the core table partition field. Ancillary objects for the document are stored into a partition of the ancillary table based on the ancillary partition fields.
    Download Collect
  • Methods, circuits and articles of manufacture for configuring DC output filter circuits

    A method of operating an AC to DC converter circuit can be provided by changing a configuration of a DC output filter circuit to reshape a current waveform in a rectifier circuit, included in the AC to DC converter circuit, based on an operating efficiency of the AC to DC converter circuit. Related circuits and articles of manufacture are also disclosed.
    Download Collect
  • Logical intra mode naming in HEVC video coding

    A method and apparatus of using logical mode numbers during both prediction and coding in the bit stream, such as for high efficiency video coders (HEVC). These logical intra mode numbers are sorted based on angle which as a result leads to improved coding designs with fewer and smaller look-up tables, and a small gain in coding efficiency. Furthermore, by using this type of naming, the number of most probable modes (MPMs) can be readily extended since no additional tables are required. The use of three MPMs achieves a larger gain of 0.25% and 0.31% for the AI_HE and AI_LC cases, respectively.
    Download Collect
  • Isolating tenants executing in multi-tenant software containers

    Technologies are described herein for isolating tenants executing in a multi-tenant software container. Mechanisms for resource isolation allow tenants executing in a multi-tenant software container to be isolated in order to prevent resource starvation by one or more of the tenants. Mechanisms for dependency isolation may be utilized to prevent one tenant executing in a multi-tenant software container from using another tenant in the same container in a manner that requires co-tenancy. Mechanisms for security isolation may be utilized to prevent one tenant in a multi-tenant software container from accessing protected data or functionality of another tenant. Mechanisms for fault isolation may be utilized to prevent tenants in a multi-tenant software container from causing faults or other types of errors that affect other tenants executing in the same software container.
    Download Collect
  • Connector and an electronic device having the same

    A connector and an electronic device that includes the connector are described. The connector includes a first helical gear for connecting with a first part of an electronic device; a second helical gear for connecting with a second part of the electronic device; and an intermediate helical gear located between and engaged with the first helical gear and the second helical gear, wherein axes of the first helical gear and the second helical gear are parallel to each other, and an axis of the intermediate helical gear is orthogonal to that of the first helical gear and the second helical gear, so that the first helical gear and the second helical gear are rotatable synchronously via a rotation of the intermediate helical gear, wherein the first helical gear and the second helical gear are engaged with the intermediate helical gear via respective line contacts.
    Download Collect
  • Methods for recombinant expression of beta-glucosidase gene

    Provided is a method for recombinant expression of β-glucosidase gene. Also provided is a recombinant expression vector comprising: (a) a coding sequence of an aspartic protease or active fragment thereof, (b) a coding sequence of β-glucosidase or active fragment thereof, and optionally (c) a linker sequence between (a) and (b). Further provided are the recombinant host cell and the recombinant cellulose-degrading microorganism comprising the recombinant expression vector, the preparation method and uses thereof.
    Download Collect
  • Search results ranking using editing distance and document information

    Architecture for extracting document information from documents received as search results based on a query string, and computing an edit distance between the data string and the query string. The edit distance is employed in determining relevance of the document as part of result ranking by detecting near-matches of a whole query or part of the query. The edit distance evaluates how close the query string is to a given data stream that includes document information such as TAUC (title, anchor text, URL, clicks) information, etc. The architecture includes the index-time splitting of compound terms in the URL to allow the more effective discovery of query terms. Additionally, index-time filtering of anchor text is utilized to find the top N anchors of one or more of the document results. The TAUC information can be input to a neural network (e.g., 2-layer) to improve relevance metrics for ranking the search results.
    Download Collect
  • Architecture and control of Reed-Solomon error-correction decoding

    Systems and methods are provided for implementing various aspects of a Reed-Solomon (RS) error-correction system. A detector can provide a decision-codeword from a channel and can also provide soft-information for the decision-codeword. If the decision-codeword corresponds to an inner code and an RS code is the outer code, a soft-information map can process the soft-information for the decision-codeword to produce soft-information for a RS decision-codeword. A RS decoder can employ the Berlekamp-Massey algorithm (BMA), list decoding, and a Chien search, and can include a pipelined architecture. A threshold-based control circuit can be used to predict whether list decoding will be needed and can suspend the list decoding operation if it predicts that list decoding is not needed.
    Download Collect
  • Methods for dynamic service deployment for virtual/physical multiple device integration

    A method implemented in an integrated edge node for performing routing functions and network appliance services at the edge of a network, the method comprising disassociating a first network feature from a port, creating a plurality of first internal virtual ports, associating the plurality of first internal virtual ports to a first network appliance service component and a core unit component, mapping the plurality first internal virtual ports to each other and to a plurality of ports, constructing an internal path comprising at least one port, a subset of the plurality of internal virtual ports, the network appliance service component, and the core unit component, and associating the first network feature to the internal path.
    Download Collect
  • Flash memory and method for fabricating the same

    A flash memory and a method for fabricating the same are provided. The flash memory comprises: a semiconductor substrate; a storage medium layer formed on the semiconductor substrate and comprising from bottom to top: a tunneling oxide layer, a silicon nitride layer and a blocking oxide layer; a semiconductor layer formed on the storage medium layer and comprising a channel region and a source region and a drain region located on both sides of the channel region respectively; and a gate stack formed on the channel region and comprising a gate dielectric and a gate formed on the gate dielectric.
    Download Collect
  • Isolating tenants executing in multi-tenant software containers

    Technologies are described herein for isolating tenants executing in a multi-tenant software container. Mechanisms for resource isolation allow tenants executing in a multi-tenant software container to be isolated in order to prevent resource starvation by one or more of the tenants. Mechanisms for dependency isolation may be utilized to prevent one tenant executing in a multi-tenant software container from using another tenant in the same container in a manner that requires co-tenancy. Mechanisms for security isolation may be utilized to prevent one tenant in a multi-tenant software container from accessing protected data or functionality of another tenant. Mechanisms for fault isolation may be utilized to prevent tenants in a multi-tenant software container from causing faults or other types of errors that affect other tenants executing in the same software container.
    Download Collect
  • Isolating tenants executing in multi-tenant software containers

    Technologies are described herein for isolating tenants executing in a multi-tenant software container. Mechanisms for resource isolation allow tenants executing in a multi-tenant software container to be isolated in order to prevent resource starvation by one or more of the tenants. Mechanisms for dependency isolation may be utilized to prevent one tenant executing in a multi-tenant software container from using another tenant in the same container in a manner that requires co-tenancy. Mechanisms for security isolation may be utilized to prevent one tenant in a multi-tenant software container from accessing protected data or functionality of another tenant. Mechanisms for fault isolation may be utilized to prevent tenants in a multi-tenant software container from causing faults or other types of errors that affect other tenants executing in the same software container.
    Download Collect
  • Pointing device with optical positioning on low-diffusive surfaces

    A computer input device includes a light source assembly forming an incident light beam that strikes an area on a surface beneath the input device with large incident angle. A light sensing assembly in the input device is positioned to receive scattered light and includes a band-pass filter. A barrier is located directly above the area where the light beam is incident on the top surface to prevent light from traveling directly from the light source assembly to the light sensing assembly.
    Download Collect
1 2 3 4 5 6 7 8 9 10

Contact

If you have any feedback, Please follow the official account to submit feedback.

Turn on your phone and scan

Submit Feedback