Unnamed: 0
int64
0
350k
ApplicationNumber
int64
9.75M
96.1M
ArtUnit
int64
1.6k
3.99k
Abstract
stringlengths
7
8.37k
Claims
stringlengths
3
292k
abstract-claims
stringlengths
68
293k
TechCenter
int64
1.6k
3.9k
344,400
16,803,891
3,771
System and method for management of intelligence requirements according to various aspects of the present technology may comprise an intelligence requirement module configured to create one or more maps between a requirement library, an intelligence source library, and a customer library. The intelligence requirement module may interact with a workflow module having a user interface dashboard that allows users to create a workflow based on generated tickets corresponding to intelligence requirements and the intelligence source providing the information supporting the intelligence requirements. The workflow module may also generate reminders to facilitate the workflow and generate reports based on completed tasks.
1. An intelligence requirement mapping and workflow tracking system, comprising: an intelligence requirement module comprising: a requirements library; an intelligence source library; and a customer library, wherein the intelligence requirement module is configured to: create a map identifying each intelligence source within the intelligence source library capable of meeting at least one intelligence requirement within the requirements library; and create a second map linking at least one intelligence requirement with each customer within the customer library; a workflow module comprising a dashboard communicatively linked to the intelligence requirement module configured to: allow a user to create at least one ticket for a customer by selecting: a set of intelligence requirements from the requirements library; and a set of intelligence sources from the mapped intelligence sources corresponding to the selected intelligence requirements; generate a plan for fulfilling the set of intelligence requirements for each ticket by creating one or more tasks; manage incoming information according to the tasks; and monitor the progress of the tasks. 2. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein the workflow module is configured to generate a report for the customer based on the fulfilled set of identified intelligence requirements from the plan. 3. An intelligence requirement mapping and workflow tracking system according to claim 2, wherein the workflow module is configured to receive customer feedback relating to the generated report. 4. An intelligence requirement mapping and workflow tracking system according to claim 2, wherein the workflow module is further configured to forward the generated report to one or more additional customers identified in the second map having a history of similar identified intelligence requirements. 5. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein the dashboard is further configured to display all intelligence requirements provided by a given intelligence source. 6. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein the dashboard is further configured to display all customers having a given intelligence requirement. 7. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein: the intelligence requirement module further comprises a risk library linking a required compliance metric with at least one intelligence requirement; and the workflow module is configured to generate a compliance report according to the generated plan for any task having an intelligence requirement linked to the risk library. 8. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein: the requirements library further comprises threat information for each intelligence requirement; and the workflow module is configured to: allow the user to assign a threat category to a given intelligence requirement within the requirements library; display to the user a summary of intelligence requirements and their corresponding threats; and allow the user to close tickets associated with a threat to indicate compliance. 9. An intelligence requirement mapping and workflow tracking system according to claim 8, wherein the workflow module is configured to display a heat map of customer intelligence requirements and corresponding threats. 10. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein the workflow module is configured to generate task reminders. 11. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein the workflow module is configured to receive user feedback relating to a performance of a selected intelligence source for a given task. 12. An internet-based intelligence requirement mapping and workflow tracking system accessible by a user device connected to the internet via a network, comprising: an intelligence requirement module, comprising: a requirements library; an intelligence source library; and a customer library, wherein the intelligence requirement module is configured to: create a map identifying each intelligence source within the intelligence source library capable of meeting at least one intelligence requirement within the requirements library; and create a second map linking at least one intelligence requirement with each customer within the customer library; a workflow module comprising a dashboard communicatively linked to the intelligence requirement module and the user device and configured to: allow a user to create at least one ticket for a customer by selecting: a set of intelligence requirements from the requirements library; and a set of intelligence sources from the mapped intelligence sources corresponding to the selected intelligence requirements; generate a plan for fulfilling the set of intelligence requirements for each ticket by creating one or more tasks; manage incoming information according to the tasks; and monitor the progress of the tasks. 13. An internet-based intelligence requirement mapping and workflow tracking system according to claim 12, wherein the workflow module is configured to generate a report for the customer based on the fulfilled set of identified intelligence requirements from the plan. 14. An internet-based intelligence requirement mapping and workflow tracking system according to claim 13, wherein the workflow module is configured to receive customer feedback relating to the generated report. 15. An internet-based intelligence requirement mapping and workflow tracking system according to claim 13, wherein the workflow module is further configured to forward the generated report to one or more additional customers identified in the second map having a history of similar identified intelligence requirements. 16. An internet-based intelligence requirement mapping and workflow tracking system according to claim 12, wherein the dashboard is further configured to display all intelligence requirements provided by a given intelligence source. 17. An internet-based intelligence requirement mapping and workflow tracking system according to claim 12, wherein the dashboard is further configured to display all customers having a given intelligence requirement. 18. An internet-based intelligence requirement mapping and workflow tracking system according to claim 12, wherein: the intelligence requirement module further comprises a risk library linking a required compliance metric with at least one intelligence requirement; and the workflow module is configured to generate a compliance report according to the generated plan for any task having an intelligence requirement linked to the risk library. 19. An internet-based intelligence requirement mapping and workflow tracking system according to claim 12, wherein: the requirements library further comprises threat information for each intelligence requirement; and the workflow module is configured to: allow the user to assign a threat category to a given intelligence requirement within the requirements library; display to the user a summary of intelligence requirements and their corresponding threats; and allow the user to close tickets associated with a threat to indicate compliance. 20. An intelligence requirement mapping and workflow tracking system according to claim 19, wherein the workflow module is configured to display a heat map of customer intelligence requirements and corresponding threats. 21. An intelligence requirement mapping and workflow tracking system according to claim 12, wherein the workflow module is configured to generate task reminders. 22. An intelligence requirement mapping and workflow tracking system according to claim 12, wherein the workflow module is configured to receive user feedback relating to a performance of a selected intelligence source for a given task.
System and method for management of intelligence requirements according to various aspects of the present technology may comprise an intelligence requirement module configured to create one or more maps between a requirement library, an intelligence source library, and a customer library. The intelligence requirement module may interact with a workflow module having a user interface dashboard that allows users to create a workflow based on generated tickets corresponding to intelligence requirements and the intelligence source providing the information supporting the intelligence requirements. The workflow module may also generate reminders to facilitate the workflow and generate reports based on completed tasks.1. An intelligence requirement mapping and workflow tracking system, comprising: an intelligence requirement module comprising: a requirements library; an intelligence source library; and a customer library, wherein the intelligence requirement module is configured to: create a map identifying each intelligence source within the intelligence source library capable of meeting at least one intelligence requirement within the requirements library; and create a second map linking at least one intelligence requirement with each customer within the customer library; a workflow module comprising a dashboard communicatively linked to the intelligence requirement module configured to: allow a user to create at least one ticket for a customer by selecting: a set of intelligence requirements from the requirements library; and a set of intelligence sources from the mapped intelligence sources corresponding to the selected intelligence requirements; generate a plan for fulfilling the set of intelligence requirements for each ticket by creating one or more tasks; manage incoming information according to the tasks; and monitor the progress of the tasks. 2. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein the workflow module is configured to generate a report for the customer based on the fulfilled set of identified intelligence requirements from the plan. 3. An intelligence requirement mapping and workflow tracking system according to claim 2, wherein the workflow module is configured to receive customer feedback relating to the generated report. 4. An intelligence requirement mapping and workflow tracking system according to claim 2, wherein the workflow module is further configured to forward the generated report to one or more additional customers identified in the second map having a history of similar identified intelligence requirements. 5. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein the dashboard is further configured to display all intelligence requirements provided by a given intelligence source. 6. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein the dashboard is further configured to display all customers having a given intelligence requirement. 7. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein: the intelligence requirement module further comprises a risk library linking a required compliance metric with at least one intelligence requirement; and the workflow module is configured to generate a compliance report according to the generated plan for any task having an intelligence requirement linked to the risk library. 8. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein: the requirements library further comprises threat information for each intelligence requirement; and the workflow module is configured to: allow the user to assign a threat category to a given intelligence requirement within the requirements library; display to the user a summary of intelligence requirements and their corresponding threats; and allow the user to close tickets associated with a threat to indicate compliance. 9. An intelligence requirement mapping and workflow tracking system according to claim 8, wherein the workflow module is configured to display a heat map of customer intelligence requirements and corresponding threats. 10. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein the workflow module is configured to generate task reminders. 11. An intelligence requirement mapping and workflow tracking system according to claim 1, wherein the workflow module is configured to receive user feedback relating to a performance of a selected intelligence source for a given task. 12. An internet-based intelligence requirement mapping and workflow tracking system accessible by a user device connected to the internet via a network, comprising: an intelligence requirement module, comprising: a requirements library; an intelligence source library; and a customer library, wherein the intelligence requirement module is configured to: create a map identifying each intelligence source within the intelligence source library capable of meeting at least one intelligence requirement within the requirements library; and create a second map linking at least one intelligence requirement with each customer within the customer library; a workflow module comprising a dashboard communicatively linked to the intelligence requirement module and the user device and configured to: allow a user to create at least one ticket for a customer by selecting: a set of intelligence requirements from the requirements library; and a set of intelligence sources from the mapped intelligence sources corresponding to the selected intelligence requirements; generate a plan for fulfilling the set of intelligence requirements for each ticket by creating one or more tasks; manage incoming information according to the tasks; and monitor the progress of the tasks. 13. An internet-based intelligence requirement mapping and workflow tracking system according to claim 12, wherein the workflow module is configured to generate a report for the customer based on the fulfilled set of identified intelligence requirements from the plan. 14. An internet-based intelligence requirement mapping and workflow tracking system according to claim 13, wherein the workflow module is configured to receive customer feedback relating to the generated report. 15. An internet-based intelligence requirement mapping and workflow tracking system according to claim 13, wherein the workflow module is further configured to forward the generated report to one or more additional customers identified in the second map having a history of similar identified intelligence requirements. 16. An internet-based intelligence requirement mapping and workflow tracking system according to claim 12, wherein the dashboard is further configured to display all intelligence requirements provided by a given intelligence source. 17. An internet-based intelligence requirement mapping and workflow tracking system according to claim 12, wherein the dashboard is further configured to display all customers having a given intelligence requirement. 18. An internet-based intelligence requirement mapping and workflow tracking system according to claim 12, wherein: the intelligence requirement module further comprises a risk library linking a required compliance metric with at least one intelligence requirement; and the workflow module is configured to generate a compliance report according to the generated plan for any task having an intelligence requirement linked to the risk library. 19. An internet-based intelligence requirement mapping and workflow tracking system according to claim 12, wherein: the requirements library further comprises threat information for each intelligence requirement; and the workflow module is configured to: allow the user to assign a threat category to a given intelligence requirement within the requirements library; display to the user a summary of intelligence requirements and their corresponding threats; and allow the user to close tickets associated with a threat to indicate compliance. 20. An intelligence requirement mapping and workflow tracking system according to claim 19, wherein the workflow module is configured to display a heat map of customer intelligence requirements and corresponding threats. 21. An intelligence requirement mapping and workflow tracking system according to claim 12, wherein the workflow module is configured to generate task reminders. 22. An intelligence requirement mapping and workflow tracking system according to claim 12, wherein the workflow module is configured to receive user feedback relating to a performance of a selected intelligence source for a given task.
3,700
344,401
16,803,861
3,771
Techniques are disclosed relating to detecting supply voltage events and performing corrective actions. In some embodiments, an apparatus includes sensor circuitry and control circuitry. In some embodiments, the sensor circuitry is configured to monitor supply voltage from a power supply and detect a load release event that includes an increase in the supply voltage that meets one or more pre-determined threshold parameters. In some embodiments, the control circuitry is configured to increase clock cycle time for operations performed by circuitry powered by the supply voltage during a time interval, wherein the time interval corresponds to ringing of the supply voltage that reduces the supply voltage and results from the load release event. In some embodiments, the disclosed techniques may reduce transients in supply voltage (which may avoid equipment damage and computing errors) and may allow for reduced voltage margins (which may reduce overall power consumption).
1-20. (canceled) 21. An apparatus, comprising: sensor circuitry configured to: monitor one or more characteristics of a supply voltage received from a power supply output; and detect a change, in at least one of the one or more monitored characteristics, that meets one or more pre-determined threshold parameters; and control circuitry configured to, in response to detection of the change by the sensor circuitry, initiate a corrective action to increase clock cycle time, during a time interval, for operations performed by a processor based on execution of program instructions while the processor is powered by the supply voltage. 22. The apparatus of claim 21, wherein the one or more pre-determined threshold parameters are associated with a load release event and wherein the control circuitry is configured to increase the clock cycle time prior to ringing of the supply voltage that results from the load release event and reduces the supply voltage. 23. The apparatus of claim 21, wherein the one or more characteristics include an increase in supply voltage that exceeds a threshold rate and threshold magnitude. 24. The apparatus of claim 21, wherein the one or more characteristics include a first reduction in supply voltage followed by a second, greater reduction in supply voltage. 25. The apparatus of claim 21, wherein the sensor circuitry is configured to store comparator outputs based on comparison of the supply voltage with different reference voltages over multiple cycles to determine a rate of change of the supply voltage. 26. The apparatus of claim 25, wherein the different reference voltages are generated by a second supply voltage and a resistor ladder. 27. The apparatus of claim 21, wherein the sensor circuitry includes a phase unit configured to determine a difference in phase between a first voltage controlled oscillator (VCO) powered by the supply voltage and a second VCO powered by a second supply voltage. 28. The apparatus of claim 27, wherein the first VCO includes multiple inverters powered by the supply voltage and wherein the other VCO includes multiple inverters powered by the second supply voltage; and wherein the sensor circuitry is configured to detect the change based on differences in phase between the first and second VCOs over multiple passes through the inverters of the first VCO. 29. The apparatus of claim 21, wherein the apparatus is configured to control the power supply to increase current supply in response to detecting a droop in the supply voltage that meets one or more threshold parameters. 30. A method, comprising: monitoring, by sensor circuitry, one or more characteristics of a supply voltage received from a power supply output; and detecting, using the sensor circuitry, a change in at least one of the one or more monitored characteristics that meets one or more pre-determined threshold parameters; and initiating a corrective action to increase clock cycle time, during a time interval, for operations performed by a processor based on execution of program instructions while the processor is powered by the supply voltage, wherein the initiating is performed by control circuitry in response to detection of the change by the sensor circuitry. 31. The method of claim 30, wherein the change is caused by a reduction in current load corresponding to a clock gating event or power gating event. 32. The method of claim 30, wherein the one or more pre-determined threshold parameters are associated with a load release event and wherein the control circuitry increases the clock cycle time prior to ringing of the supply voltage that results from the load release event and reduces the supply voltage. 33. The method of claim 30, wherein the detecting is based on a difference in phase between a first voltage controlled oscillator (VCO) powered by the supply voltage and a second VCO powered by a second supply voltage. 34. The method of claim 30, further comprising performing the correcting action, wherein the corrective action includes downshifting an oscillator using an open loop mode. 35. A non-transitory computer readable storage medium having stored thereon design information that specifies a design of at least a portion of a hardware integrated circuit in a format recognized by a semiconductor fabrication system that is configured to use the design information to produce the circuit according to the design, including: sensor circuitry configured to: monitor one or more characteristics of a supply voltage received from a power supply output; and detect a change, in at least one of the one or more monitored characteristics, that meets one or more pre-determined threshold parameters; and control circuitry configured to, in response to detection of the change by the sensor circuitry, initiate a corrective action to increase clock cycle time, during a time interval, for operations performed by a processor based on execution of program instructions while the processor is powered by the supply voltage. 36. The non-transitory computer readable storage medium of claim 35, wherein the one or more pre-determined threshold parameters are associated with a load release event and wherein the control circuitry is configured to increase the clock cycle time prior to ringing of the supply voltage that results from the load release event and reduces the supply voltage. 37. The non-transitory computer readable storage medium of claim 35, wherein the one or more characteristics include an increase in supply voltage that exceeds a threshold rate and threshold magnitude. 38. The non-transitory computer readable storage medium of claim 35, wherein the sensor circuitry is configured to store comparator outputs based on comparison of the supply voltage with different reference voltages over multiple cycles to determine a rate of change of the supply voltage. 39. The non-transitory computer readable storage medium of claim 35, wherein the sensor circuitry includes a phase unit configured to determine a difference in phase between a first voltage controlled oscillator (VCO) powered by the supply voltage and a second VCO powered by a second supply voltage. 40. The non-transitory computer readable storage medium of claim 35, wherein the corrective action includes a downshift of an oscillator using an open loop mode.
Techniques are disclosed relating to detecting supply voltage events and performing corrective actions. In some embodiments, an apparatus includes sensor circuitry and control circuitry. In some embodiments, the sensor circuitry is configured to monitor supply voltage from a power supply and detect a load release event that includes an increase in the supply voltage that meets one or more pre-determined threshold parameters. In some embodiments, the control circuitry is configured to increase clock cycle time for operations performed by circuitry powered by the supply voltage during a time interval, wherein the time interval corresponds to ringing of the supply voltage that reduces the supply voltage and results from the load release event. In some embodiments, the disclosed techniques may reduce transients in supply voltage (which may avoid equipment damage and computing errors) and may allow for reduced voltage margins (which may reduce overall power consumption).1-20. (canceled) 21. An apparatus, comprising: sensor circuitry configured to: monitor one or more characteristics of a supply voltage received from a power supply output; and detect a change, in at least one of the one or more monitored characteristics, that meets one or more pre-determined threshold parameters; and control circuitry configured to, in response to detection of the change by the sensor circuitry, initiate a corrective action to increase clock cycle time, during a time interval, for operations performed by a processor based on execution of program instructions while the processor is powered by the supply voltage. 22. The apparatus of claim 21, wherein the one or more pre-determined threshold parameters are associated with a load release event and wherein the control circuitry is configured to increase the clock cycle time prior to ringing of the supply voltage that results from the load release event and reduces the supply voltage. 23. The apparatus of claim 21, wherein the one or more characteristics include an increase in supply voltage that exceeds a threshold rate and threshold magnitude. 24. The apparatus of claim 21, wherein the one or more characteristics include a first reduction in supply voltage followed by a second, greater reduction in supply voltage. 25. The apparatus of claim 21, wherein the sensor circuitry is configured to store comparator outputs based on comparison of the supply voltage with different reference voltages over multiple cycles to determine a rate of change of the supply voltage. 26. The apparatus of claim 25, wherein the different reference voltages are generated by a second supply voltage and a resistor ladder. 27. The apparatus of claim 21, wherein the sensor circuitry includes a phase unit configured to determine a difference in phase between a first voltage controlled oscillator (VCO) powered by the supply voltage and a second VCO powered by a second supply voltage. 28. The apparatus of claim 27, wherein the first VCO includes multiple inverters powered by the supply voltage and wherein the other VCO includes multiple inverters powered by the second supply voltage; and wherein the sensor circuitry is configured to detect the change based on differences in phase between the first and second VCOs over multiple passes through the inverters of the first VCO. 29. The apparatus of claim 21, wherein the apparatus is configured to control the power supply to increase current supply in response to detecting a droop in the supply voltage that meets one or more threshold parameters. 30. A method, comprising: monitoring, by sensor circuitry, one or more characteristics of a supply voltage received from a power supply output; and detecting, using the sensor circuitry, a change in at least one of the one or more monitored characteristics that meets one or more pre-determined threshold parameters; and initiating a corrective action to increase clock cycle time, during a time interval, for operations performed by a processor based on execution of program instructions while the processor is powered by the supply voltage, wherein the initiating is performed by control circuitry in response to detection of the change by the sensor circuitry. 31. The method of claim 30, wherein the change is caused by a reduction in current load corresponding to a clock gating event or power gating event. 32. The method of claim 30, wherein the one or more pre-determined threshold parameters are associated with a load release event and wherein the control circuitry increases the clock cycle time prior to ringing of the supply voltage that results from the load release event and reduces the supply voltage. 33. The method of claim 30, wherein the detecting is based on a difference in phase between a first voltage controlled oscillator (VCO) powered by the supply voltage and a second VCO powered by a second supply voltage. 34. The method of claim 30, further comprising performing the correcting action, wherein the corrective action includes downshifting an oscillator using an open loop mode. 35. A non-transitory computer readable storage medium having stored thereon design information that specifies a design of at least a portion of a hardware integrated circuit in a format recognized by a semiconductor fabrication system that is configured to use the design information to produce the circuit according to the design, including: sensor circuitry configured to: monitor one or more characteristics of a supply voltage received from a power supply output; and detect a change, in at least one of the one or more monitored characteristics, that meets one or more pre-determined threshold parameters; and control circuitry configured to, in response to detection of the change by the sensor circuitry, initiate a corrective action to increase clock cycle time, during a time interval, for operations performed by a processor based on execution of program instructions while the processor is powered by the supply voltage. 36. The non-transitory computer readable storage medium of claim 35, wherein the one or more pre-determined threshold parameters are associated with a load release event and wherein the control circuitry is configured to increase the clock cycle time prior to ringing of the supply voltage that results from the load release event and reduces the supply voltage. 37. The non-transitory computer readable storage medium of claim 35, wherein the one or more characteristics include an increase in supply voltage that exceeds a threshold rate and threshold magnitude. 38. The non-transitory computer readable storage medium of claim 35, wherein the sensor circuitry is configured to store comparator outputs based on comparison of the supply voltage with different reference voltages over multiple cycles to determine a rate of change of the supply voltage. 39. The non-transitory computer readable storage medium of claim 35, wherein the sensor circuitry includes a phase unit configured to determine a difference in phase between a first voltage controlled oscillator (VCO) powered by the supply voltage and a second VCO powered by a second supply voltage. 40. The non-transitory computer readable storage medium of claim 35, wherein the corrective action includes a downshift of an oscillator using an open loop mode.
3,700
344,402
16,803,739
3,771
Disclosed herein is a system and method for increasing the fidelity of measured genetic data, for making allele calls, and for determining the state of aneuploidy, in one or a small set of cells, or from fragmentary DNA, where a limited quantity of genetic data is available. Poorly or incorrectly measured base pairs, missing alleles and missing regions are reconstructed using expected similarities between the target genome and the genome of genetically related individuals. In accordance with one embodiment, incomplete genetic data from an embryonic cell are reconstructed at a plurality of loci using the more complete genetic data from a larger sample of diploid cells from one or both parents, with or without haploid genetic data from one or both parents. In another embodiment, the chromosome copy number can be determined from the measured genetic data, with or without genetic information from one or both parents.
1. A method for determining genetic data for DNA from a subject, the method comprising: isolating DNA from a blood sample from the subject, wherein the DNA comprises DNA fragments; amplifying a plurality of target loci from the DNA fragments to obtain amplification products, wherein adaptors comprising universal amplification sequences are ligated to the ends of the fragmented DNA or DNA derived therefrom, before amplifying the plurality of target loci and wherein the amplifying comprises nested PCR; and using high throughput genotyping by sequencing by synthesis to detect genetic material from the amplification products and produce genetic data for the plurality of target loci on a chromosome or chromosome segment of interest. 2. The method of claim 1, wherein the genetic data produced by the high throughput genotyping is noisy and comprises allele drop out errors. 3. The method of claim 1, wherein the genetic data produced by the high throughput genotyping is noisy and comprises measurement bias. 4. The method of claim 1, wherein the genetic data produced by the high throughput genotyping is noisy and comprises incorrect measurements. 5. The method of claim 1, wherein the plurality of target loci comprises SNPs. 6. The method of claim 5, wherein the confidence that each SNP is correctly called is at least 95%. 7. The method of claim 5, wherein the confidence that each SNP is correctly called is at least 99%. 8. The method of claim 1, wherein the plurality of target loci comprises at least 14 SNPs. 9. The method of claim 1, wherein the plurality of target loci comprises at least 70 SNPs. 10. The method of claim 1, wherein the plurality of target loci comprises at least 131 SNPs. 11. The method of claim 1, wherein the plurality of target loci comprises at least 384 SNPs. 12. The method of claim 1, wherein the plurality of target loci comprises at least 500 SNPs. 13. The method of claim 1, further comprising normalizing the genetic data for differences in amplification and/or measurement efficiency between the loci. 14. The method of claim 1, wherein the subject is afflicted with cancer. 15. The method of claim 1, wherein the subject is suspected of having cancer. 16. The method of claim 1, wherein the method further comprises after the sequencing: creating a set of one or more hypotheses specifying genetic data for DNA from the individual; determining the probability of each of the hypotheses given the produced genetic data; and using the probabilities associated with each hypothesis to determine the most likely genetic data for DNA from the individual. 17. The method of claim 16, wherein the probability of each of the hypotheses is determined without use of a reference sample. 18. A method, comprising: isolating DNA from a blood sample from an individual, wherein the DNA comprises DNA fragments; amplifying a plurality of target loci from at least some of the DNA fragments to obtain amplification products, wherein the target loci are amplified by amplifying at least some of the DNA fragments with targeted PCR primers and universal PCR primers; and sequencing a clonal DNA population generated from the amplification products using a next generation sequencing method to detect genetic material from the amplification products and produce genetic data for the plurality of target loci on a chromosome or chromosome segment of interest. 19. The method of claim 18, wherein the next generation sequencing is sequencing by synthesis. 20. The method of claim 18, wherein adaptors comprising universal amplification sequences are ligated to the ends of the fragmented DNA or DNA derived therefrom, before amplifying the plurality of target loci. 21. The method of claim 18, wherein the amplification comprises nested PCR. 22. The method of claim 18, wherein the individual is afflicted with cancer. 23. The method of claim 18, wherein the individual is suspected of having cancer. 24. The method of claim 18, wherein the method further comprises after the sequencing: creating a set of one or more hypotheses specifying genetic data for DNA from the individual; determining the probability of each of the hypotheses given the produced genetic data; and using the probabilities associated with each hypothesis to determine the most likely genetic data for DNA from the individual. 25. The method of claim 24, wherein the probability of each of the hypotheses is determined without use of a reference sample. 26. The method of claim 18, wherein the plurality of target loci comprises at least 70 SNPs. 27. The method of claim 18, wherein the plurality of target loci comprises at least 131 SNPs. 28. The method of claim 18, wherein the plurality of target loci comprises at least 384 SNPs. 29. The method of claim 18, wherein the plurality of target loci comprises at least 500 SNPs.
Disclosed herein is a system and method for increasing the fidelity of measured genetic data, for making allele calls, and for determining the state of aneuploidy, in one or a small set of cells, or from fragmentary DNA, where a limited quantity of genetic data is available. Poorly or incorrectly measured base pairs, missing alleles and missing regions are reconstructed using expected similarities between the target genome and the genome of genetically related individuals. In accordance with one embodiment, incomplete genetic data from an embryonic cell are reconstructed at a plurality of loci using the more complete genetic data from a larger sample of diploid cells from one or both parents, with or without haploid genetic data from one or both parents. In another embodiment, the chromosome copy number can be determined from the measured genetic data, with or without genetic information from one or both parents.1. A method for determining genetic data for DNA from a subject, the method comprising: isolating DNA from a blood sample from the subject, wherein the DNA comprises DNA fragments; amplifying a plurality of target loci from the DNA fragments to obtain amplification products, wherein adaptors comprising universal amplification sequences are ligated to the ends of the fragmented DNA or DNA derived therefrom, before amplifying the plurality of target loci and wherein the amplifying comprises nested PCR; and using high throughput genotyping by sequencing by synthesis to detect genetic material from the amplification products and produce genetic data for the plurality of target loci on a chromosome or chromosome segment of interest. 2. The method of claim 1, wherein the genetic data produced by the high throughput genotyping is noisy and comprises allele drop out errors. 3. The method of claim 1, wherein the genetic data produced by the high throughput genotyping is noisy and comprises measurement bias. 4. The method of claim 1, wherein the genetic data produced by the high throughput genotyping is noisy and comprises incorrect measurements. 5. The method of claim 1, wherein the plurality of target loci comprises SNPs. 6. The method of claim 5, wherein the confidence that each SNP is correctly called is at least 95%. 7. The method of claim 5, wherein the confidence that each SNP is correctly called is at least 99%. 8. The method of claim 1, wherein the plurality of target loci comprises at least 14 SNPs. 9. The method of claim 1, wherein the plurality of target loci comprises at least 70 SNPs. 10. The method of claim 1, wherein the plurality of target loci comprises at least 131 SNPs. 11. The method of claim 1, wherein the plurality of target loci comprises at least 384 SNPs. 12. The method of claim 1, wherein the plurality of target loci comprises at least 500 SNPs. 13. The method of claim 1, further comprising normalizing the genetic data for differences in amplification and/or measurement efficiency between the loci. 14. The method of claim 1, wherein the subject is afflicted with cancer. 15. The method of claim 1, wherein the subject is suspected of having cancer. 16. The method of claim 1, wherein the method further comprises after the sequencing: creating a set of one or more hypotheses specifying genetic data for DNA from the individual; determining the probability of each of the hypotheses given the produced genetic data; and using the probabilities associated with each hypothesis to determine the most likely genetic data for DNA from the individual. 17. The method of claim 16, wherein the probability of each of the hypotheses is determined without use of a reference sample. 18. A method, comprising: isolating DNA from a blood sample from an individual, wherein the DNA comprises DNA fragments; amplifying a plurality of target loci from at least some of the DNA fragments to obtain amplification products, wherein the target loci are amplified by amplifying at least some of the DNA fragments with targeted PCR primers and universal PCR primers; and sequencing a clonal DNA population generated from the amplification products using a next generation sequencing method to detect genetic material from the amplification products and produce genetic data for the plurality of target loci on a chromosome or chromosome segment of interest. 19. The method of claim 18, wherein the next generation sequencing is sequencing by synthesis. 20. The method of claim 18, wherein adaptors comprising universal amplification sequences are ligated to the ends of the fragmented DNA or DNA derived therefrom, before amplifying the plurality of target loci. 21. The method of claim 18, wherein the amplification comprises nested PCR. 22. The method of claim 18, wherein the individual is afflicted with cancer. 23. The method of claim 18, wherein the individual is suspected of having cancer. 24. The method of claim 18, wherein the method further comprises after the sequencing: creating a set of one or more hypotheses specifying genetic data for DNA from the individual; determining the probability of each of the hypotheses given the produced genetic data; and using the probabilities associated with each hypothesis to determine the most likely genetic data for DNA from the individual. 25. The method of claim 24, wherein the probability of each of the hypotheses is determined without use of a reference sample. 26. The method of claim 18, wherein the plurality of target loci comprises at least 70 SNPs. 27. The method of claim 18, wherein the plurality of target loci comprises at least 131 SNPs. 28. The method of claim 18, wherein the plurality of target loci comprises at least 384 SNPs. 29. The method of claim 18, wherein the plurality of target loci comprises at least 500 SNPs.
3,700
344,403
16,803,842
3,771
The present disclosure generally relates to methods for processing of substrates, and more particularly relates to methods for forming a metal gapfill. In one implementation, the method includes forming a metal gapfill in an opening using a multi-step process. The multi-step process includes forming a first portion of the metal gapfill, performing a sputter process to form one or more layers on one or more side walls, and growing a second portion of the metal gapfill to fill the opening with the metal gapfill. The metal gapfill formed by the multi-step process is seamless, and the one or more layers formed on the one or more side walls seal any gaps or defects between the metal gapfill and the side walls. As a result, fluids utilized in subsequent processes do not diffuse through the metal gapfill.
1. A method for forming a metal gapfill, the method comprising: forming a first portion of the metal gapfill over a surface of a first layer in an opening formed in a second layer; performing a sputtering process on the first portion; and forming a second portion of the metal gapfill to fill the opening with the metal gapfill. 2. The method of claim 1, wherein the first portion of the metal gapfill and the second portion of the metal gapfill are fabricated from cobalt, tungsten, or ruthenium. 3. The method of claim 1, wherein the first layer comprises a metal. 4. The method of claim 1, wherein the second layer comprises a dielectric layer. 5. The method of claim 1, further comprising performing a pre-clean process on the surface of the first layer prior to forming the first portion of the metal gapfill. 6. The method of claim 5, further comprising forming a metal seed layer on the surface of the first layer, wherein the first portion of the metal gapfill is formed on the metal seed layer. 7. The method of claim 1, wherein the sputtering process utilizes argon plasma. 8. A method for forming a metal gapfill, the method comprising: forming a first portion of the metal gapfill over a surface of a first layer in an opening formed in a second layer; forming one or more layers on one or more side walls of the second layer; and forming a second portion of the metal gapfill to fill the opening with the metal gapfill. 9. The method of claim 8, wherein the first portion of the metal gapfill, the one or more layers, and the second portion of the metal gapfill are fabricated from cobalt, tungsten, or ruthenium. 10. The method of claim 8, wherein the first layer comprises a metal. 11. The method of claim 8, wherein the second layer comprises a dielectric layer. 12. The method of claim 8, further comprising performing a pre-clean process on the surface of the first layer prior to forming the first portion of the metal gapfill. 13. The method of claim 12, further comprising forming a metal seed layer on the surface of the first layer, wherein the first portion of the metal gapfill is formed on the metal seed layer. 14. The method of claim 8, wherein the one or more layers are formed by a sputtering process that utilizes argon plasma. 15. A processing system comprising: a transfer chamber; a plurality of process chambers coupled to the transfer chamber; and a controller configured to cause a process to be performed in the processing system that includes: forming a first portion of a metal gapfill over a surface of a first layer in an opening formed in a second layer; performing a sputtering process on the first portion; and forming a second portion of the metal gapfill to fill the opening with the metal gapfill. 16. The processing system of claim 15, wherein the first portion of the metal gapfill and the second portion of the metal gapfill are fabricated from cobalt, tungsten, or ruthenium. 17. The processing system of claim 15, wherein the first layer comprises a metal. 18. The processing system of claim 15, wherein the second layer comprises a dielectric layer. 19. The processing system of claim 15, further comprising performing a pre-clean process on the surface of the first layer prior to forming the first portion of the metal gapfill. 20. The processing system of claim 19, further comprising forming a metal seed layer on the surface of the first layer, wherein the first portion of the metal gapfill is formed on the metal seed layer.
The present disclosure generally relates to methods for processing of substrates, and more particularly relates to methods for forming a metal gapfill. In one implementation, the method includes forming a metal gapfill in an opening using a multi-step process. The multi-step process includes forming a first portion of the metal gapfill, performing a sputter process to form one or more layers on one or more side walls, and growing a second portion of the metal gapfill to fill the opening with the metal gapfill. The metal gapfill formed by the multi-step process is seamless, and the one or more layers formed on the one or more side walls seal any gaps or defects between the metal gapfill and the side walls. As a result, fluids utilized in subsequent processes do not diffuse through the metal gapfill.1. A method for forming a metal gapfill, the method comprising: forming a first portion of the metal gapfill over a surface of a first layer in an opening formed in a second layer; performing a sputtering process on the first portion; and forming a second portion of the metal gapfill to fill the opening with the metal gapfill. 2. The method of claim 1, wherein the first portion of the metal gapfill and the second portion of the metal gapfill are fabricated from cobalt, tungsten, or ruthenium. 3. The method of claim 1, wherein the first layer comprises a metal. 4. The method of claim 1, wherein the second layer comprises a dielectric layer. 5. The method of claim 1, further comprising performing a pre-clean process on the surface of the first layer prior to forming the first portion of the metal gapfill. 6. The method of claim 5, further comprising forming a metal seed layer on the surface of the first layer, wherein the first portion of the metal gapfill is formed on the metal seed layer. 7. The method of claim 1, wherein the sputtering process utilizes argon plasma. 8. A method for forming a metal gapfill, the method comprising: forming a first portion of the metal gapfill over a surface of a first layer in an opening formed in a second layer; forming one or more layers on one or more side walls of the second layer; and forming a second portion of the metal gapfill to fill the opening with the metal gapfill. 9. The method of claim 8, wherein the first portion of the metal gapfill, the one or more layers, and the second portion of the metal gapfill are fabricated from cobalt, tungsten, or ruthenium. 10. The method of claim 8, wherein the first layer comprises a metal. 11. The method of claim 8, wherein the second layer comprises a dielectric layer. 12. The method of claim 8, further comprising performing a pre-clean process on the surface of the first layer prior to forming the first portion of the metal gapfill. 13. The method of claim 12, further comprising forming a metal seed layer on the surface of the first layer, wherein the first portion of the metal gapfill is formed on the metal seed layer. 14. The method of claim 8, wherein the one or more layers are formed by a sputtering process that utilizes argon plasma. 15. A processing system comprising: a transfer chamber; a plurality of process chambers coupled to the transfer chamber; and a controller configured to cause a process to be performed in the processing system that includes: forming a first portion of a metal gapfill over a surface of a first layer in an opening formed in a second layer; performing a sputtering process on the first portion; and forming a second portion of the metal gapfill to fill the opening with the metal gapfill. 16. The processing system of claim 15, wherein the first portion of the metal gapfill and the second portion of the metal gapfill are fabricated from cobalt, tungsten, or ruthenium. 17. The processing system of claim 15, wherein the first layer comprises a metal. 18. The processing system of claim 15, wherein the second layer comprises a dielectric layer. 19. The processing system of claim 15, further comprising performing a pre-clean process on the surface of the first layer prior to forming the first portion of the metal gapfill. 20. The processing system of claim 19, further comprising forming a metal seed layer on the surface of the first layer, wherein the first portion of the metal gapfill is formed on the metal seed layer.
3,700
344,404
16,803,888
3,771
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may generate an uplink random access message, including a random access preamble and an uplink shared channel resource unit, of a two-step random access procedure. The UE may identify configuration information for uplink control information (UCI) multiplexing. The UE may identify a trigger for inclusion of UCI with the uplink random access message. The UE may multiplex the UCI and a reference signal with the uplink shared channel resource unit and map the uplink control information to resource elements in the uplink shared channel resource unit based on a priority of the uplink control information and a location of resource elements to which the reference signal is mapped. The UE may transmit the uplink random access message comprising the uplink control information and an indication of the used UCI configuration to the base station.
1. A method for wireless communications, comprising: identifying a configuration for multiplexing uplink control information on an uplink random access message of a two-step random access procedure; generating the uplink random access message, the uplink random access message comprising a random access preamble and an associated uplink shared channel resource unit; identifying a trigger for inclusion of the uplink control information with the uplink random access message; multiplexing the uplink control information and a reference signal in the uplink shared channel resource unit based on the configuration; mapping the uplink control information to resource elements in the uplink shared channel resource unit based at least in part on a type of the uplink control information and a location of resource elements to which the reference signal is mapped, wherein at least some different types of uplink control information are mapped to different resource elements; and transmitting the uplink random access message comprising the uplink control information to a base station. 2. The method of claim 1, further comprising: identifying a plurality of uplink control information parts of the uplink control information. 3. The method of claim 2, wherein each type of the uplink control information is associated with a priority and wherein mapping the uplink control information further comprises: mapping the plurality of uplink control information parts to respective resource elements based at least in part on respective priorities of the plurality of uplink control information parts. 4. The method of claim 3, further comprising: mapping a first uplink control information part with a higher priority closer to resource elements to which the reference signal is mapped than a second uplink control information part with a lower priority. 5. The method of claim 2, wherein each uplink control information part of the plurality of uplink control information parts comprises a different priority of the uplink control information. 6. The method of claim 2, further comprising: indicating a number of uplink control information parts in the plurality of uplink control information parts based at least in part on a preamble grouping of the random access preamble. 7. The method of claim 2, further comprising: indicating a number of uplink control information parts in the plurality of uplink control information parts based at least in part on a demodulation reference signal (DMRS) grouping. 8. The method of claim 2, further comprising: indicating a number of uplink control information parts in the plurality of uplink control information parts based at least in part on puncturing the uplink shared channel resource unit. 9. The method of claim 2, further comprising: including, in a first uplink control information part, a pointer to a second uplink control information part, wherein a number of uplink control information parts in the plurality of uplink control information parts is indicated based at least in part on a number of pointers comprising at least the pointer. 10. The method of claim 1, further comprising: identifying configuration information for mapping the uplink control information, the configuration information comprising beta offset information, one or more formats for the uplink control information, a payload size, or any combination thereof. 11. The method of claim 10, further comprising: receiving an indication of the configuration information from the base station, wherein the configuration information is identified based at least in part on a Radio Resource Control (RRC) state of a UE transmitting the uplink random access message, and wherein the indication is received in a system information block (SIB), an RRC message, or downlink control information. 12. The method of claim 1, wherein the two-step random access procedure is a contention-free two-step random access procedure or a contention-based two-step random access procedure. 13. The method of claim 1, wherein identifying the trigger further comprises: receiving a group common downlink control channel message from the base station, wherein the inclusion of uplink control information is based at least in part on receiving the group common downlink control channel message. 14. The method of claim 1, wherein identifying the trigger further comprises: receiving Radio Resource Control (RRC) signaling from the base station, wherein the inclusion of uplink control information is based at least in part on receiving the RRC signaling. 15. The method of claim 1, wherein identifying the trigger further comprises: determining the uplink random access message is a retransmission of an initial uplink random access message. 16. The method of claim 15, wherein the uplink control information comprises a redundancy version, a hybrid automatic repeat request (HARM) process identifier, or both. 17. The method of claim 1, wherein identifying the trigger further comprises: identifying configured sets of resource unit sizes, modulation and coding schemes (MCS), transport block sizes (TBS), or any combination thereof; selecting a resource unit size, an MCS, and a TBS to use for the uplink random access message; and including an indicator of the selected resource unit size, the selected MCS, and the selected TBS in the uplink control information. 18. The method of claim 1, wherein identifying the trigger further comprises: identifying a configured set of random access occasions; selecting a random access occasion for transmitting the uplink random access message from the configured set of random access occasions, wherein the random access occasion is associated with a synchronization signal block (SSB) beam index; and including an indicator of the SSB beam index in the uplink control information. 19. The method of claim 1, wherein identifying the trigger further comprises: identifying a configured set of random access preambles; selecting the random access preamble from the configured set of random access preambles, wherein the random access preamble is associated with a synchronization signal block (SSB) beam index; and including an indicator of the SSB beam index in the uplink control information. 20. The method of claim 1, wherein identifying the trigger further comprises: performing a measurement on a downlink reference signal from the base station to obtain a downlink measurement; and including an indicator of the downlink measurement in the uplink control information. 21. The method of claim 1, wherein the uplink control information comprises uplink shared channel information, acknowledgment (ACK) or negative acknowledgment (NACK) feedback, a channel state information (CSI) report, a scheduling request, interference measurement information, positioning measurement information, reference signal received power (RSRP) measurement information for a serving cell or one or more neighboring cells, beam management information, or any combination thereof. 22. The method of claim 21, wherein the uplink shared channel information comprises modulation and coding scheme (MCS) information, a redundancy version, a transport block size (TBS), a new data indicator (NDI), a hybrid automatic repeat request (HARQ) process number, or any combination thereof. 23. The method of claim 21, wherein the beam management information comprises a list of preferred beam indexes or transmit beam switching information, or both, the transmit beam switching information indicating a first transmit beam for the random access preamble and a second transmit beam for the uplink shared channel resource unit. 24. The method of claim 1, wherein the uplink control information comprises acknowledgment (ACK) or negative acknowledgment (NACK) feedback, a channel state information (CSI) report, a scheduling request, or any combination thereof. 25. The method of claim 1, further comprising: indicating that the uplink random access message comprises the uplink control information based at least in part on a preamble grouping of the random access preamble. 26. The method of claim 1, further comprising: indicating that the uplink random access message comprises the uplink control information based at least in part on a demodulation reference signal (DMRS) grouping. 27. The method of claim 1, further comprising: indicating that the uplink random access message comprises the uplink control information based at least in part on a puncturing of the uplink shared channel resource unit. 28. An apparatus for wireless communications, comprising: a processor, memory coupled with the processor; and instructions stored in the memory and executable by the processor to cause the apparatus to: identify a configuration for multiplexing uplink control information on an uplink random access message of a two-step random access procedure; generate the uplink random access message, the uplink random access message comprising a random access preamble and an uplink shared channel resource unit; identify a trigger for inclusion of the uplink control information with the uplink random access message; multiplex the uplink control information and a reference signal with the uplink shared channel resource unit; map the uplink control information to resource elements in the uplink shared channel resource unit based at least in part on a priority of the uplink control information and a location of resource elements to which the reference signal is mapped, wherein at least some different types of uplink control information are mapped to different resource elements; and transmit the uplink random access message comprising the uplink control information to a base station. 29. An apparatus for wireless communications, comprising: means for identifying a configuration for multiplexing uplink control information on an uplink random access message of a two-step random access procedure; means for generating the uplink random access message, the uplink random access message comprising a random access preamble and an associated uplink shared channel resource unit; means for identifying a trigger for inclusion of the uplink control information with the uplink random access message; means for multiplexing the uplink control information and a reference signal in the uplink shared channel resource unit based on the configuration; means for mapping the uplink control information to resource elements in the uplink shared channel resource unit based at least in part on a type of the uplink control information and a location of resource elements to which the reference signal is mapped, wherein at least some different types of uplink control information are mapped to different resource elements; and means for transmitting the uplink random access message comprising the uplink control information to a base station. 30. A non-transitory computer-readable medium storing code for wireless communications, the code comprising instructions executable by a processor to: identifying a configuration for multiplexing uplink control information on an uplink random access message of a two-step random access procedure; generate the uplink random access message, the uplink random access message comprising a random access preamble and an associated uplink shared channel resource unit; identify a trigger for inclusion of the uplink control information with the uplink random access message; multiplex the uplink control information and a reference signal in the uplink shared channel resource unit based on the configuration; map the uplink control information to resource elements in the uplink shared channel resource unit based at least in part on a type of the uplink control information and a location of resource elements to which the reference signal is mapped, wherein at least some different types of uplink control information are mapped to different resource elements; and transmit the uplink random access message comprising the uplink control information to a base station.
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may generate an uplink random access message, including a random access preamble and an uplink shared channel resource unit, of a two-step random access procedure. The UE may identify configuration information for uplink control information (UCI) multiplexing. The UE may identify a trigger for inclusion of UCI with the uplink random access message. The UE may multiplex the UCI and a reference signal with the uplink shared channel resource unit and map the uplink control information to resource elements in the uplink shared channel resource unit based on a priority of the uplink control information and a location of resource elements to which the reference signal is mapped. The UE may transmit the uplink random access message comprising the uplink control information and an indication of the used UCI configuration to the base station.1. A method for wireless communications, comprising: identifying a configuration for multiplexing uplink control information on an uplink random access message of a two-step random access procedure; generating the uplink random access message, the uplink random access message comprising a random access preamble and an associated uplink shared channel resource unit; identifying a trigger for inclusion of the uplink control information with the uplink random access message; multiplexing the uplink control information and a reference signal in the uplink shared channel resource unit based on the configuration; mapping the uplink control information to resource elements in the uplink shared channel resource unit based at least in part on a type of the uplink control information and a location of resource elements to which the reference signal is mapped, wherein at least some different types of uplink control information are mapped to different resource elements; and transmitting the uplink random access message comprising the uplink control information to a base station. 2. The method of claim 1, further comprising: identifying a plurality of uplink control information parts of the uplink control information. 3. The method of claim 2, wherein each type of the uplink control information is associated with a priority and wherein mapping the uplink control information further comprises: mapping the plurality of uplink control information parts to respective resource elements based at least in part on respective priorities of the plurality of uplink control information parts. 4. The method of claim 3, further comprising: mapping a first uplink control information part with a higher priority closer to resource elements to which the reference signal is mapped than a second uplink control information part with a lower priority. 5. The method of claim 2, wherein each uplink control information part of the plurality of uplink control information parts comprises a different priority of the uplink control information. 6. The method of claim 2, further comprising: indicating a number of uplink control information parts in the plurality of uplink control information parts based at least in part on a preamble grouping of the random access preamble. 7. The method of claim 2, further comprising: indicating a number of uplink control information parts in the plurality of uplink control information parts based at least in part on a demodulation reference signal (DMRS) grouping. 8. The method of claim 2, further comprising: indicating a number of uplink control information parts in the plurality of uplink control information parts based at least in part on puncturing the uplink shared channel resource unit. 9. The method of claim 2, further comprising: including, in a first uplink control information part, a pointer to a second uplink control information part, wherein a number of uplink control information parts in the plurality of uplink control information parts is indicated based at least in part on a number of pointers comprising at least the pointer. 10. The method of claim 1, further comprising: identifying configuration information for mapping the uplink control information, the configuration information comprising beta offset information, one or more formats for the uplink control information, a payload size, or any combination thereof. 11. The method of claim 10, further comprising: receiving an indication of the configuration information from the base station, wherein the configuration information is identified based at least in part on a Radio Resource Control (RRC) state of a UE transmitting the uplink random access message, and wherein the indication is received in a system information block (SIB), an RRC message, or downlink control information. 12. The method of claim 1, wherein the two-step random access procedure is a contention-free two-step random access procedure or a contention-based two-step random access procedure. 13. The method of claim 1, wherein identifying the trigger further comprises: receiving a group common downlink control channel message from the base station, wherein the inclusion of uplink control information is based at least in part on receiving the group common downlink control channel message. 14. The method of claim 1, wherein identifying the trigger further comprises: receiving Radio Resource Control (RRC) signaling from the base station, wherein the inclusion of uplink control information is based at least in part on receiving the RRC signaling. 15. The method of claim 1, wherein identifying the trigger further comprises: determining the uplink random access message is a retransmission of an initial uplink random access message. 16. The method of claim 15, wherein the uplink control information comprises a redundancy version, a hybrid automatic repeat request (HARM) process identifier, or both. 17. The method of claim 1, wherein identifying the trigger further comprises: identifying configured sets of resource unit sizes, modulation and coding schemes (MCS), transport block sizes (TBS), or any combination thereof; selecting a resource unit size, an MCS, and a TBS to use for the uplink random access message; and including an indicator of the selected resource unit size, the selected MCS, and the selected TBS in the uplink control information. 18. The method of claim 1, wherein identifying the trigger further comprises: identifying a configured set of random access occasions; selecting a random access occasion for transmitting the uplink random access message from the configured set of random access occasions, wherein the random access occasion is associated with a synchronization signal block (SSB) beam index; and including an indicator of the SSB beam index in the uplink control information. 19. The method of claim 1, wherein identifying the trigger further comprises: identifying a configured set of random access preambles; selecting the random access preamble from the configured set of random access preambles, wherein the random access preamble is associated with a synchronization signal block (SSB) beam index; and including an indicator of the SSB beam index in the uplink control information. 20. The method of claim 1, wherein identifying the trigger further comprises: performing a measurement on a downlink reference signal from the base station to obtain a downlink measurement; and including an indicator of the downlink measurement in the uplink control information. 21. The method of claim 1, wherein the uplink control information comprises uplink shared channel information, acknowledgment (ACK) or negative acknowledgment (NACK) feedback, a channel state information (CSI) report, a scheduling request, interference measurement information, positioning measurement information, reference signal received power (RSRP) measurement information for a serving cell or one or more neighboring cells, beam management information, or any combination thereof. 22. The method of claim 21, wherein the uplink shared channel information comprises modulation and coding scheme (MCS) information, a redundancy version, a transport block size (TBS), a new data indicator (NDI), a hybrid automatic repeat request (HARQ) process number, or any combination thereof. 23. The method of claim 21, wherein the beam management information comprises a list of preferred beam indexes or transmit beam switching information, or both, the transmit beam switching information indicating a first transmit beam for the random access preamble and a second transmit beam for the uplink shared channel resource unit. 24. The method of claim 1, wherein the uplink control information comprises acknowledgment (ACK) or negative acknowledgment (NACK) feedback, a channel state information (CSI) report, a scheduling request, or any combination thereof. 25. The method of claim 1, further comprising: indicating that the uplink random access message comprises the uplink control information based at least in part on a preamble grouping of the random access preamble. 26. The method of claim 1, further comprising: indicating that the uplink random access message comprises the uplink control information based at least in part on a demodulation reference signal (DMRS) grouping. 27. The method of claim 1, further comprising: indicating that the uplink random access message comprises the uplink control information based at least in part on a puncturing of the uplink shared channel resource unit. 28. An apparatus for wireless communications, comprising: a processor, memory coupled with the processor; and instructions stored in the memory and executable by the processor to cause the apparatus to: identify a configuration for multiplexing uplink control information on an uplink random access message of a two-step random access procedure; generate the uplink random access message, the uplink random access message comprising a random access preamble and an uplink shared channel resource unit; identify a trigger for inclusion of the uplink control information with the uplink random access message; multiplex the uplink control information and a reference signal with the uplink shared channel resource unit; map the uplink control information to resource elements in the uplink shared channel resource unit based at least in part on a priority of the uplink control information and a location of resource elements to which the reference signal is mapped, wherein at least some different types of uplink control information are mapped to different resource elements; and transmit the uplink random access message comprising the uplink control information to a base station. 29. An apparatus for wireless communications, comprising: means for identifying a configuration for multiplexing uplink control information on an uplink random access message of a two-step random access procedure; means for generating the uplink random access message, the uplink random access message comprising a random access preamble and an associated uplink shared channel resource unit; means for identifying a trigger for inclusion of the uplink control information with the uplink random access message; means for multiplexing the uplink control information and a reference signal in the uplink shared channel resource unit based on the configuration; means for mapping the uplink control information to resource elements in the uplink shared channel resource unit based at least in part on a type of the uplink control information and a location of resource elements to which the reference signal is mapped, wherein at least some different types of uplink control information are mapped to different resource elements; and means for transmitting the uplink random access message comprising the uplink control information to a base station. 30. A non-transitory computer-readable medium storing code for wireless communications, the code comprising instructions executable by a processor to: identifying a configuration for multiplexing uplink control information on an uplink random access message of a two-step random access procedure; generate the uplink random access message, the uplink random access message comprising a random access preamble and an associated uplink shared channel resource unit; identify a trigger for inclusion of the uplink control information with the uplink random access message; multiplex the uplink control information and a reference signal in the uplink shared channel resource unit based on the configuration; map the uplink control information to resource elements in the uplink shared channel resource unit based at least in part on a type of the uplink control information and a location of resource elements to which the reference signal is mapped, wherein at least some different types of uplink control information are mapped to different resource elements; and transmit the uplink random access message comprising the uplink control information to a base station.
3,700
344,405
16,803,864
3,771
A first set of records and a second set of records different from the first set of records are obtained. A score that indicates indicating confidence that the first set of records and the second set of records correspond to a same individual is computed. As a result of the score reaching a value relative to a threshold, a device of an individual associated with the second set of records is caused to prompt the individual to confirm control of a first asset identified by first data within the first set of records. A message to a destination associated with the first asset is provided. As a result of a response to the message indicating that the individual is the same individual, an association between the second set of records and the first asset is stored and the device is caused to display details about the first and second sets of records.
1. A computer-implemented method, comprising: obtaining a first set of records from persistent storage at a first storage location; obtaining, from a second storage location, a second set of records different from the first set of records; computing, based at least in part on the second set of records, a confidence score that indicates an amount confidence that the first set of records and the second set of records correspond to a same individual; as a result of the confidence score exceeding a threshold, causing a client device of an individual associated with the second set of records to prompt the individual to confirm control of a first asset identified by first data within the first set of records, the first data being absent from the second set of records; sending, in response to receiving a confirmation from the client device, a message to a destination associated with the first asset; obtaining a response to the message indicating that the first asset is controlled by the individual; storing an association between the first set of records and a second asset identified by second data within the second set of records; and updating an interface of the client device to cause the client device to display details about the first set of records and the second set of records. 2. The computer-implemented method of claim 1, wherein storing the association includes associating the first asset with the second set of records. 3. The computer-implemented method of claim 1, wherein the first set of records was recorded prior to the second set of records. 4. The computer-implemented method of claim 1, wherein the first asset is associated with an address that indicates the destination to which communications can be transmitted. 5. The computer-implemented method of claim 4, wherein: sending the message to the destination includes transmitting the message to the destination via the address; and the response indicates that the first asset is controlled by the individual by indicating that the message was received at the destination. 6. The computer-implemented method of claim 1, wherein updating the interface further includes updating the interface to display details about the second set of records simultaneously with details about the first set of records. 7. The computer-implemented method of claim 6, wherein storing the association further includes updating a database containing the first set of records to indicate that the first set of records is associated with the second asset. 8. A system, comprising: one or more processors; and memory including executable instructions that, if executed by the one or more processors, cause the system to: obtain a first set of records from persistent storage; obtain a second set of records different from the first set of records; compute, based at least in part on the second set of records and the first set of records, a score that indicates an amount of confidence that the first set of records and the second set of records correspond to a same individual; cause, as a result of the score reaching a value relative to a threshold, a device of an individual associated with the second set of records to prompt the individual to confirm control of a first asset identified by first data within the first set of records, the first data being absent from the second set of records; provide, in response to receiving a confirmation from the device, a message to a destination associated with the first asset; confirm, as a result of a response to the message indicating that the first asset is controlled by the individual, that the individual is the same individual; store an association between the second set of records and the first asset; and cause the client device to display details about both the first set of records and the second set of records. 9. The system of claim 8, wherein the executable instructions that cause the cause the system to send the message to the destination further include instructions that further cause the system to transmit the message via an address specified in the first data. 10. The system of claim 8, wherein the first asset is one of a computing device or an account. 11. The system of claim 8, wherein the executable instructions that cause the system to compute the confidence score further include instructions that further cause the system to: provide, as input to a plurality of decision trees, details associated with the second set of records and the first set of records; and receive, as output from the plurality of decision trees, the confidence score in response. 12. The system of claim 11, wherein: the plurality of decision trees comprise a random forest; and the output is a result of votes by the plurality of decision trees of the random forest. 13. The system of claim 12, wherein the executable instructions further include instructions that further cause the system to, further as the result of the response indicating that the first asset is controlled by the individual, store the first set of records with a set of historical records usable to train the random forest. 14. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by one or more processors of a computer system, cause the computer system to at least: obtain a first set of records from persistent storage at a first storage location; obtain, from a second storage location, a second set of records different from the first set of records; compute, based at least in part on the second set of records and the first set of records, a confidence score that indicates an amount of confidence that the first set of records correspond to a same individual as the second set of records; as a result of the confidence score exceeding a threshold, cause an interface of a client device of an individual associated with the second set of records to prompt the individual to confirm control of a first asset identified by first data within the first set of records, the first data being absent from the second set of records; transmit, in response to receiving a confirmation from the client device, a message to a destination address associated with the first asset; and as a result of a determination that a response to the message transmitted indicates that the first asset is controlled by the same individual that controls a second asset identified by second data within the second set of records: associate, in a data store, the first set of records with the second asset; and update the interface to cause the client device to concurrently display details about the first set of records and the second set of records. 15. The non-transitory computer-readable storage medium of claim 14, wherein: the message includes a confirmation code; and the executable instructions further include instructions that further cause the computer system to determine, based at least in part on the response including a match to the confirmation code, that the response received indicates that the first asset is controlled by the individual. 16. The non-transitory computer-readable storage medium of claim 15, wherein: the second set of records indicates that a second asset is associated with both a first individual and a second individual; and the executable instructions further include instructions that cause the computer system to cause an interface to prompt the individual to provide information usable to determine which of the first individual or the second individual is the individual. 17. The non-transitory computer-readable storage medium of claim 14, wherein the executable instructions further include instructions that further cause computer system to as a result of a determination that the response received fails to indicate that the first asset is controlled by the same individual, disassociate the first set of records from the second set of records. 18. The non-transitory computer-readable storage medium of claim 17, wherein the executable instructions that cause the computer system to compute the confidence score further include instructions that further cause the computer system to: provide details of the second set of records and the first set of records as input to a random forest having a ground truth value corresponding to a user identity; and receive, as output from the random forest, the confidence score in response. 19. The non-transitory computer-readable storage medium of claim 18, wherein the executable instructions further include instructions that further cause the computer system to retrain the random forest from a set of historical records that includes the second set of records. 20. The non-transitory computer-readable storage medium of claim 19, wherein the executable instructions that cause the computer system to retrain the random forest further include instructions that further cause the computer system to, further as the result of the determination that the response received fails to indicate that the first asset is controlled by the same individual, retrain the random forest from the set of historical records disregarding the first set of records.
A first set of records and a second set of records different from the first set of records are obtained. A score that indicates indicating confidence that the first set of records and the second set of records correspond to a same individual is computed. As a result of the score reaching a value relative to a threshold, a device of an individual associated with the second set of records is caused to prompt the individual to confirm control of a first asset identified by first data within the first set of records. A message to a destination associated with the first asset is provided. As a result of a response to the message indicating that the individual is the same individual, an association between the second set of records and the first asset is stored and the device is caused to display details about the first and second sets of records.1. A computer-implemented method, comprising: obtaining a first set of records from persistent storage at a first storage location; obtaining, from a second storage location, a second set of records different from the first set of records; computing, based at least in part on the second set of records, a confidence score that indicates an amount confidence that the first set of records and the second set of records correspond to a same individual; as a result of the confidence score exceeding a threshold, causing a client device of an individual associated with the second set of records to prompt the individual to confirm control of a first asset identified by first data within the first set of records, the first data being absent from the second set of records; sending, in response to receiving a confirmation from the client device, a message to a destination associated with the first asset; obtaining a response to the message indicating that the first asset is controlled by the individual; storing an association between the first set of records and a second asset identified by second data within the second set of records; and updating an interface of the client device to cause the client device to display details about the first set of records and the second set of records. 2. The computer-implemented method of claim 1, wherein storing the association includes associating the first asset with the second set of records. 3. The computer-implemented method of claim 1, wherein the first set of records was recorded prior to the second set of records. 4. The computer-implemented method of claim 1, wherein the first asset is associated with an address that indicates the destination to which communications can be transmitted. 5. The computer-implemented method of claim 4, wherein: sending the message to the destination includes transmitting the message to the destination via the address; and the response indicates that the first asset is controlled by the individual by indicating that the message was received at the destination. 6. The computer-implemented method of claim 1, wherein updating the interface further includes updating the interface to display details about the second set of records simultaneously with details about the first set of records. 7. The computer-implemented method of claim 6, wherein storing the association further includes updating a database containing the first set of records to indicate that the first set of records is associated with the second asset. 8. A system, comprising: one or more processors; and memory including executable instructions that, if executed by the one or more processors, cause the system to: obtain a first set of records from persistent storage; obtain a second set of records different from the first set of records; compute, based at least in part on the second set of records and the first set of records, a score that indicates an amount of confidence that the first set of records and the second set of records correspond to a same individual; cause, as a result of the score reaching a value relative to a threshold, a device of an individual associated with the second set of records to prompt the individual to confirm control of a first asset identified by first data within the first set of records, the first data being absent from the second set of records; provide, in response to receiving a confirmation from the device, a message to a destination associated with the first asset; confirm, as a result of a response to the message indicating that the first asset is controlled by the individual, that the individual is the same individual; store an association between the second set of records and the first asset; and cause the client device to display details about both the first set of records and the second set of records. 9. The system of claim 8, wherein the executable instructions that cause the cause the system to send the message to the destination further include instructions that further cause the system to transmit the message via an address specified in the first data. 10. The system of claim 8, wherein the first asset is one of a computing device or an account. 11. The system of claim 8, wherein the executable instructions that cause the system to compute the confidence score further include instructions that further cause the system to: provide, as input to a plurality of decision trees, details associated with the second set of records and the first set of records; and receive, as output from the plurality of decision trees, the confidence score in response. 12. The system of claim 11, wherein: the plurality of decision trees comprise a random forest; and the output is a result of votes by the plurality of decision trees of the random forest. 13. The system of claim 12, wherein the executable instructions further include instructions that further cause the system to, further as the result of the response indicating that the first asset is controlled by the individual, store the first set of records with a set of historical records usable to train the random forest. 14. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by one or more processors of a computer system, cause the computer system to at least: obtain a first set of records from persistent storage at a first storage location; obtain, from a second storage location, a second set of records different from the first set of records; compute, based at least in part on the second set of records and the first set of records, a confidence score that indicates an amount of confidence that the first set of records correspond to a same individual as the second set of records; as a result of the confidence score exceeding a threshold, cause an interface of a client device of an individual associated with the second set of records to prompt the individual to confirm control of a first asset identified by first data within the first set of records, the first data being absent from the second set of records; transmit, in response to receiving a confirmation from the client device, a message to a destination address associated with the first asset; and as a result of a determination that a response to the message transmitted indicates that the first asset is controlled by the same individual that controls a second asset identified by second data within the second set of records: associate, in a data store, the first set of records with the second asset; and update the interface to cause the client device to concurrently display details about the first set of records and the second set of records. 15. The non-transitory computer-readable storage medium of claim 14, wherein: the message includes a confirmation code; and the executable instructions further include instructions that further cause the computer system to determine, based at least in part on the response including a match to the confirmation code, that the response received indicates that the first asset is controlled by the individual. 16. The non-transitory computer-readable storage medium of claim 15, wherein: the second set of records indicates that a second asset is associated with both a first individual and a second individual; and the executable instructions further include instructions that cause the computer system to cause an interface to prompt the individual to provide information usable to determine which of the first individual or the second individual is the individual. 17. The non-transitory computer-readable storage medium of claim 14, wherein the executable instructions further include instructions that further cause computer system to as a result of a determination that the response received fails to indicate that the first asset is controlled by the same individual, disassociate the first set of records from the second set of records. 18. The non-transitory computer-readable storage medium of claim 17, wherein the executable instructions that cause the computer system to compute the confidence score further include instructions that further cause the computer system to: provide details of the second set of records and the first set of records as input to a random forest having a ground truth value corresponding to a user identity; and receive, as output from the random forest, the confidence score in response. 19. The non-transitory computer-readable storage medium of claim 18, wherein the executable instructions further include instructions that further cause the computer system to retrain the random forest from a set of historical records that includes the second set of records. 20. The non-transitory computer-readable storage medium of claim 19, wherein the executable instructions that cause the computer system to retrain the random forest further include instructions that further cause the computer system to, further as the result of the determination that the response received fails to indicate that the first asset is controlled by the same individual, retrain the random forest from the set of historical records disregarding the first set of records.
3,700
344,406
16,803,916
3,771
A technique enhances security measures in the IoT by reducing leakage of private images and degraded security due to unauthorized image capturing, eliminates the possibility that an unintended image is captured and stored, and also shows people around the user that the camera function of an electronic device is not working. A camera module shielding mechanism for shielding a camera module by retracting the camera module into a housing of an electronic device includes a support member supporting the camera module, a slide support supporting the support member in a slidable manner, an urging member that urges the support member in a direction in which the camera module protrudes from the housing, a locking member that locks the support member with the camera module retracted in the housing, and an actuator that unlocks the locking member.
1. A camera module shielding mechanism for shielding a camera module by retracting the camera module into a housing of an electronic device, the mechanism comprising: a support member supporting the camera module; a slide support supporting the support member in a slidable manner; an urging member configured to urge the support member in a direction in which the camera module protrudes from the housing; a locking member configured to lock the support member with the camera module retracted in the housing; and an actuator configured to unlock the locking member. 2. The camera module shielding mechanism according to claim 1, wherein the support member is slidable in a manner to maintain an orientation of a lens optical axis of the camera module. 3. The camera module shielding mechanism according to claim 1, wherein the slide support is located on a base member supporting the actuator, and the support member is slidable along a flat surface of the base member. 4. The camera module shielding mechanism according to claim 3, wherein the base member has a receiving portion in which the camera module is retractable. 5. The camera module shielding mechanism according to claim 4, wherein the base member supports a microphone, and the support member includes a sound insulator to cover a sound pickup portion of the microphone when the camera module is retracted. 6. An electronic device, comprising: a housing; a camera module; and a shielding mechanism configured to shield the camera module by retracting the camera module into the housing, wherein the shielding mechanism includes a support member supporting the camera module, a slide support supporting the support member in a slidable manner, an urging member configured to urge the support member in a direction in which the camera module protrudes from the housing, a locking member configured to lock the support member with the camera module retracted in the housing, and an actuator configured to unlock the locking member.
A technique enhances security measures in the IoT by reducing leakage of private images and degraded security due to unauthorized image capturing, eliminates the possibility that an unintended image is captured and stored, and also shows people around the user that the camera function of an electronic device is not working. A camera module shielding mechanism for shielding a camera module by retracting the camera module into a housing of an electronic device includes a support member supporting the camera module, a slide support supporting the support member in a slidable manner, an urging member that urges the support member in a direction in which the camera module protrudes from the housing, a locking member that locks the support member with the camera module retracted in the housing, and an actuator that unlocks the locking member.1. A camera module shielding mechanism for shielding a camera module by retracting the camera module into a housing of an electronic device, the mechanism comprising: a support member supporting the camera module; a slide support supporting the support member in a slidable manner; an urging member configured to urge the support member in a direction in which the camera module protrudes from the housing; a locking member configured to lock the support member with the camera module retracted in the housing; and an actuator configured to unlock the locking member. 2. The camera module shielding mechanism according to claim 1, wherein the support member is slidable in a manner to maintain an orientation of a lens optical axis of the camera module. 3. The camera module shielding mechanism according to claim 1, wherein the slide support is located on a base member supporting the actuator, and the support member is slidable along a flat surface of the base member. 4. The camera module shielding mechanism according to claim 3, wherein the base member has a receiving portion in which the camera module is retractable. 5. The camera module shielding mechanism according to claim 4, wherein the base member supports a microphone, and the support member includes a sound insulator to cover a sound pickup portion of the microphone when the camera module is retracted. 6. An electronic device, comprising: a housing; a camera module; and a shielding mechanism configured to shield the camera module by retracting the camera module into the housing, wherein the shielding mechanism includes a support member supporting the camera module, a slide support supporting the support member in a slidable manner, an urging member configured to urge the support member in a direction in which the camera module protrudes from the housing, a locking member configured to lock the support member with the camera module retracted in the housing, and an actuator configured to unlock the locking member.
3,700
344,407
16,803,917
3,771
An apparatus includes a memory and a hardware processor. The memory stores a threshold. The processor receives first, second, and third messages. The processor determines a number of occurrences of words in the messages. The processor also calculates probabilities that a word in the messages is a particular word and co-occurrence probabilities. The processor further calculates probability distributions of words in the messages. The processor also calculates probabilities based on the probability distributions. The processor compares these probabilities to a threshold to determine whether the first message is related to the second message and/or whether the first message is related to the third message.
1. An apparatus comprising: a memory configured to store a threshold; a hardware processor communicatively coupled to the memory, the hardware processor configured to: receive a first message comprising a first word and a second word; receive a second message comprising a third word and a fourth word; determine a first number of occurrences of the first word in the first message; determine a second number of occurrences of the second word in the first message; determine a third number of occurrences of the third word in the second message; determine a fourth number of occurrences of the fourth word in the second message; calculate a first probability that a word in the first message is the first word by dividing the first number of occurrences by a total number of words in the first message; calculate a second probability that a word in the first message is the second word by dividing the second number of occurrences by the total number of words in the first message; calculate a third probability that a word in the second message is the third word by dividing the third number of occurrences by a total number of words in the second message; calculate a fourth probability that a word in the second message is the fourth word by dividing the fourth number of occurrences by the total number of words in the second message; calculate a fifth probability that a word in the first message and a word in the second message are both the first word; calculate a sixth probability that a word in the first message and a word in the second message are both the second word; calculate a first probability distribution for the first message, the first probability distribution comprising the first probability and the second probability; calculate a second probability distribution for the second message, the second probability distribution comprising the third probability, the fourth probability, the fifth probability, and the sixth probability; calculate, based on the first probability distribution and the second probability distribution, a seventh probability; compare the seventh probability to the threshold; based on the comparison of the seventh probability to the threshold, identify the second message as related to the first message. 2. The apparatus of claim 1, wherein the processor is further configured to: determine a fifth number of occurrences of a fifth word in the first message; add a non-zero constant to the fifth number to produce a sixth number of occurrences; and calculate an eighth probability that a word in the first message is the fifth word by dividing the sixth number of occurrences by the total number of words in the first message. 3. The apparatus of claim 1, wherein calculating the first probability distribution comprises: multiplying the first probability by a first weight; and multiplying the second probability by a second weight. 4. The apparatus of claim 3, wherein the first weight is inversely proportional to a number of messages in which the first word appears. 5. The apparatus of claim 1, wherein the processor is further configured to quarantine the second message in response to identifying the second message as related to the first message. 6. The apparatus of claim 1, wherein calculating the fifth probability comprises: multiplying the first probability with the third probability to produce a first product; multiplying the second probability with the fourth probability to produce a second product; and adding the first product and the second product. 7. The apparatus of claim 1, wherein the first and third words are the same word. 8. A method comprising: storing, by a memory, a threshold; receiving, by a hardware processor communicatively coupled to the memory, a first message comprising a first word and a second word; receiving, by the hardware processor, a second message comprising a third word and a fourth word; determining, by the hardware processor, a first number of occurrences of the first word in the first message; determining, by the hardware processor, a second number of occurrences of the second word in the first message; determining, by the hardware processor, a third number of occurrences of the third word in the second message; determining, by the hardware processor, a fourth number of occurrences of the fourth word in the second message; calculating, by the hardware processor, a first probability that a word in the first message is the first word by dividing the first number of occurrences by a total number of words in the first message; calculating, by the hardware processor, a second probability that a word in the first message is the second word by dividing the second number of occurrences by the total number of words in the first message; calculating, by the hardware processor, a third probability that a word in the second message is the third word by dividing the third number of occurrences by a total number of words in the second message; calculating, by the hardware processor, a fourth probability that a word in the second message is the fourth word by dividing the fourth number of occurrences by the total number of words in the second message; calculating, by the hardware processor, a fifth probability that a word in the first message and a word in the second message are both the first word; calculating, by the hardware processor, a sixth probability that a word in the first message and a word in the second message are both the second word; calculating, by the hardware processor, a first probability distribution for the first message, the first probability distribution comprising the first probability and the second probability; calculating, by the hardware processor, a second probability distribution for the second message, the second probability distribution comprising the third probability, the fourth probability, the fifth probability, and the sixth probability; calculating, by the hardware processor, based on the first probability distribution and the second probability distribution, a seventh probability; comparing, by the hardware processor, the seventh probability to the threshold; based on the comparison of the seventh probability to the threshold, identifying, by the hardware processor, the second message as related to the first message. 9. The method of claim 8, further comprising: determining a fifth number of occurrences of a fifth word in the first message; adding a non-zero constant to the fifth number to produce a sixth number of occurrences; and calculating an eighth probability that a word in the first message is the seventh word by dividing the sixth number of occurrences by the total number of words in the first message. 10. The method of claim 8, wherein calculating the first probability distribution comprises: multiplying the first probability by a first weight; and multiplying the second probability by a second weight. 11. The method of claim 10, wherein the first weight is inversely proportional to a number of messages in which the first word appears. 12. The method of claim 8, further comprising quarantining the second message in response to identifying the second message as related to the first message. 13. The method of claim 8, wherein calculating the fifth probability comprises: multiplying the first probability with the third probability to produce a first product; multiplying the second probability with the fourth probability to produce a second product; and adding the first product and the second product. 14. The method of claim 8, wherein the first and third words are the same word. 15. A system comprising: a network; and a network security tool communicatively coupled to the network, the network security tool comprising a memory and a hardware processor configured to: store a threshold; receive a first message over the network, the first message comprising a first word and a second word; receive a second message over the network, the second message comprising a third word and a fourth word; determine a first number of occurrences of the first word in the first message; determine a second number of occurrences of the second word in the first message; determine a third number of occurrences of the third word in the second message; determine a fourth number of occurrences of the fourth word in the second message; calculate a first probability that a word in the first message is the first word by dividing the first number of occurrences by a total number of words in the first message; calculate a second probability that a word in the first message is the second word by dividing the second number of occurrences by the total number of words in the first message; calculate a third probability that a word in the second message is the third word by dividing the third number of occurrences by a total number of words in the second message; calculate a fourth probability that a word in the second message is the fourth word by dividing the fourth number of occurrences by the total number of words in the second message; calculate a fifth probability that a word in the first message and a word in the second message are both the first word; calculate a sixth probability that a word in the first message and a word in the second message are both the second word; calculate a first probability distribution for the first message, the first probability distribution comprising the first probability and the second probability; calculate a second probability distribution for the second message, the second probability distribution comprising the third probability, the fourth probability, the seventh probability, and the sixth probability; calculate, based on the first probability distribution, the second probability distribution, a seventh probability; compare the seventh probability to the threshold; based on the comparison of the seventh probability to the threshold, identify the second message as related to the first message. 16. The system of claim 15, wherein the network security tool is further configured to: determine a fifth number of occurrences of a fifth word in the first message; add a non-zero constant to the fifth number to produce a sixth number of occurrences; and calculate an eighth probability that a word in the first message is the fifth word by dividing the sixth number of occurrences by the total number of words in the first message. 17. The system of claim 15, wherein calculating the first probability distribution comprises: multiplying the first probability by a first weight; and multiplying the second probability by a second weight. 18. The system of claim 17, wherein the first weight is inversely proportional to a number of messages in which the first word appears. 19. The system of claim 15, wherein the processor is further configured to quarantine the second message in response to identifying the second message as related to the first message. 20. The system of claim 15, wherein calculating the fifth probability comprises: multiplying the first probability with the third probability to produce a first product; multiplying the second probability with the fourth probability to produce a second product; and adding the first product and the second product. 21. The system of claim 15, wherein the first and third words are the same word.
An apparatus includes a memory and a hardware processor. The memory stores a threshold. The processor receives first, second, and third messages. The processor determines a number of occurrences of words in the messages. The processor also calculates probabilities that a word in the messages is a particular word and co-occurrence probabilities. The processor further calculates probability distributions of words in the messages. The processor also calculates probabilities based on the probability distributions. The processor compares these probabilities to a threshold to determine whether the first message is related to the second message and/or whether the first message is related to the third message.1. An apparatus comprising: a memory configured to store a threshold; a hardware processor communicatively coupled to the memory, the hardware processor configured to: receive a first message comprising a first word and a second word; receive a second message comprising a third word and a fourth word; determine a first number of occurrences of the first word in the first message; determine a second number of occurrences of the second word in the first message; determine a third number of occurrences of the third word in the second message; determine a fourth number of occurrences of the fourth word in the second message; calculate a first probability that a word in the first message is the first word by dividing the first number of occurrences by a total number of words in the first message; calculate a second probability that a word in the first message is the second word by dividing the second number of occurrences by the total number of words in the first message; calculate a third probability that a word in the second message is the third word by dividing the third number of occurrences by a total number of words in the second message; calculate a fourth probability that a word in the second message is the fourth word by dividing the fourth number of occurrences by the total number of words in the second message; calculate a fifth probability that a word in the first message and a word in the second message are both the first word; calculate a sixth probability that a word in the first message and a word in the second message are both the second word; calculate a first probability distribution for the first message, the first probability distribution comprising the first probability and the second probability; calculate a second probability distribution for the second message, the second probability distribution comprising the third probability, the fourth probability, the fifth probability, and the sixth probability; calculate, based on the first probability distribution and the second probability distribution, a seventh probability; compare the seventh probability to the threshold; based on the comparison of the seventh probability to the threshold, identify the second message as related to the first message. 2. The apparatus of claim 1, wherein the processor is further configured to: determine a fifth number of occurrences of a fifth word in the first message; add a non-zero constant to the fifth number to produce a sixth number of occurrences; and calculate an eighth probability that a word in the first message is the fifth word by dividing the sixth number of occurrences by the total number of words in the first message. 3. The apparatus of claim 1, wherein calculating the first probability distribution comprises: multiplying the first probability by a first weight; and multiplying the second probability by a second weight. 4. The apparatus of claim 3, wherein the first weight is inversely proportional to a number of messages in which the first word appears. 5. The apparatus of claim 1, wherein the processor is further configured to quarantine the second message in response to identifying the second message as related to the first message. 6. The apparatus of claim 1, wherein calculating the fifth probability comprises: multiplying the first probability with the third probability to produce a first product; multiplying the second probability with the fourth probability to produce a second product; and adding the first product and the second product. 7. The apparatus of claim 1, wherein the first and third words are the same word. 8. A method comprising: storing, by a memory, a threshold; receiving, by a hardware processor communicatively coupled to the memory, a first message comprising a first word and a second word; receiving, by the hardware processor, a second message comprising a third word and a fourth word; determining, by the hardware processor, a first number of occurrences of the first word in the first message; determining, by the hardware processor, a second number of occurrences of the second word in the first message; determining, by the hardware processor, a third number of occurrences of the third word in the second message; determining, by the hardware processor, a fourth number of occurrences of the fourth word in the second message; calculating, by the hardware processor, a first probability that a word in the first message is the first word by dividing the first number of occurrences by a total number of words in the first message; calculating, by the hardware processor, a second probability that a word in the first message is the second word by dividing the second number of occurrences by the total number of words in the first message; calculating, by the hardware processor, a third probability that a word in the second message is the third word by dividing the third number of occurrences by a total number of words in the second message; calculating, by the hardware processor, a fourth probability that a word in the second message is the fourth word by dividing the fourth number of occurrences by the total number of words in the second message; calculating, by the hardware processor, a fifth probability that a word in the first message and a word in the second message are both the first word; calculating, by the hardware processor, a sixth probability that a word in the first message and a word in the second message are both the second word; calculating, by the hardware processor, a first probability distribution for the first message, the first probability distribution comprising the first probability and the second probability; calculating, by the hardware processor, a second probability distribution for the second message, the second probability distribution comprising the third probability, the fourth probability, the fifth probability, and the sixth probability; calculating, by the hardware processor, based on the first probability distribution and the second probability distribution, a seventh probability; comparing, by the hardware processor, the seventh probability to the threshold; based on the comparison of the seventh probability to the threshold, identifying, by the hardware processor, the second message as related to the first message. 9. The method of claim 8, further comprising: determining a fifth number of occurrences of a fifth word in the first message; adding a non-zero constant to the fifth number to produce a sixth number of occurrences; and calculating an eighth probability that a word in the first message is the seventh word by dividing the sixth number of occurrences by the total number of words in the first message. 10. The method of claim 8, wherein calculating the first probability distribution comprises: multiplying the first probability by a first weight; and multiplying the second probability by a second weight. 11. The method of claim 10, wherein the first weight is inversely proportional to a number of messages in which the first word appears. 12. The method of claim 8, further comprising quarantining the second message in response to identifying the second message as related to the first message. 13. The method of claim 8, wherein calculating the fifth probability comprises: multiplying the first probability with the third probability to produce a first product; multiplying the second probability with the fourth probability to produce a second product; and adding the first product and the second product. 14. The method of claim 8, wherein the first and third words are the same word. 15. A system comprising: a network; and a network security tool communicatively coupled to the network, the network security tool comprising a memory and a hardware processor configured to: store a threshold; receive a first message over the network, the first message comprising a first word and a second word; receive a second message over the network, the second message comprising a third word and a fourth word; determine a first number of occurrences of the first word in the first message; determine a second number of occurrences of the second word in the first message; determine a third number of occurrences of the third word in the second message; determine a fourth number of occurrences of the fourth word in the second message; calculate a first probability that a word in the first message is the first word by dividing the first number of occurrences by a total number of words in the first message; calculate a second probability that a word in the first message is the second word by dividing the second number of occurrences by the total number of words in the first message; calculate a third probability that a word in the second message is the third word by dividing the third number of occurrences by a total number of words in the second message; calculate a fourth probability that a word in the second message is the fourth word by dividing the fourth number of occurrences by the total number of words in the second message; calculate a fifth probability that a word in the first message and a word in the second message are both the first word; calculate a sixth probability that a word in the first message and a word in the second message are both the second word; calculate a first probability distribution for the first message, the first probability distribution comprising the first probability and the second probability; calculate a second probability distribution for the second message, the second probability distribution comprising the third probability, the fourth probability, the seventh probability, and the sixth probability; calculate, based on the first probability distribution, the second probability distribution, a seventh probability; compare the seventh probability to the threshold; based on the comparison of the seventh probability to the threshold, identify the second message as related to the first message. 16. The system of claim 15, wherein the network security tool is further configured to: determine a fifth number of occurrences of a fifth word in the first message; add a non-zero constant to the fifth number to produce a sixth number of occurrences; and calculate an eighth probability that a word in the first message is the fifth word by dividing the sixth number of occurrences by the total number of words in the first message. 17. The system of claim 15, wherein calculating the first probability distribution comprises: multiplying the first probability by a first weight; and multiplying the second probability by a second weight. 18. The system of claim 17, wherein the first weight is inversely proportional to a number of messages in which the first word appears. 19. The system of claim 15, wherein the processor is further configured to quarantine the second message in response to identifying the second message as related to the first message. 20. The system of claim 15, wherein calculating the fifth probability comprises: multiplying the first probability with the third probability to produce a first product; multiplying the second probability with the fourth probability to produce a second product; and adding the first product and the second product. 21. The system of claim 15, wherein the first and third words are the same word.
3,700
344,408
16,803,915
3,771
A method for controlling the building of architecture of gramineous crops and application thereof. The gene CYC U4;1 (Os10g41430) has a specific expression in a rice pulvinus (which is believed to have a specific expression in other gramineous crops), with a CDS sequence as shown in SEQ ID NO: 2, and an encoded amino acid sequence as shown in SEQ ID NO: 3. Also a promoter sequence of the gene, with the sequence as shown in SEQ ID NO: 1. Transgenic lines obtained by cloning a promoter and full-length CDS of CYC U4;1 to pCAMBIA1301 and transferring this into rice Nipponbare are all characterized by having smaller leaf-stem angles than those of wild rice, accordingly, the expression level of the gene CYC U4;1 can be increased or decreased with genetic engineering technology to control the plant architecture development, thereby improving the plant architecture and increasing the density of germplasm.
1. A method for controlling leaf erectness development of rice plants, comprising cloning a cDNA nucleic acid sequence of SEQ ID NO: 2 or a truncated portion thereof into a plant expression vector, genetically transforming rice plants with the plant expression vector, wherein the genetic transformation is mediated by an agrobacterium, and screening and growing the genetically transformed rice plants, wherein the plant expression vector comprises the cloned cDNA nucleic acid sequence. 2. The method of claim 1, further comprising amplifying a promoter region comprising a nucleic acid sequence of SEQ ID NO: 1, and cloning a fragment of the amplified promoter region to the plant expression vector. 3. The method of claim 1, wherein the plant expression vector is constructed to have the complete cDNA nucleic acid sequence of SEQ ID NO:2. 4. The method of claim 2, wherein the plant expression vector is constructed to have the complete cDNA nucleic acid sequence of SEQ ID NO:2. 5. The method of claim 4, wherein leaf-stem angles of the genetically transformed rice plants are decreased. 6. The method of claim 1, wherein the plant expression vector is constructed to have the truncated portion of the cDNA with a sequence of base pairs 345 to 639 of SEQ ID NO: 2. 7. The method of claim 6, wherein the plant expression vector is an RNAi vector. 8. The method of claim 7, wherein leaf-stem angles of the genetically transformed rice plants are increased.
A method for controlling the building of architecture of gramineous crops and application thereof. The gene CYC U4;1 (Os10g41430) has a specific expression in a rice pulvinus (which is believed to have a specific expression in other gramineous crops), with a CDS sequence as shown in SEQ ID NO: 2, and an encoded amino acid sequence as shown in SEQ ID NO: 3. Also a promoter sequence of the gene, with the sequence as shown in SEQ ID NO: 1. Transgenic lines obtained by cloning a promoter and full-length CDS of CYC U4;1 to pCAMBIA1301 and transferring this into rice Nipponbare are all characterized by having smaller leaf-stem angles than those of wild rice, accordingly, the expression level of the gene CYC U4;1 can be increased or decreased with genetic engineering technology to control the plant architecture development, thereby improving the plant architecture and increasing the density of germplasm.1. A method for controlling leaf erectness development of rice plants, comprising cloning a cDNA nucleic acid sequence of SEQ ID NO: 2 or a truncated portion thereof into a plant expression vector, genetically transforming rice plants with the plant expression vector, wherein the genetic transformation is mediated by an agrobacterium, and screening and growing the genetically transformed rice plants, wherein the plant expression vector comprises the cloned cDNA nucleic acid sequence. 2. The method of claim 1, further comprising amplifying a promoter region comprising a nucleic acid sequence of SEQ ID NO: 1, and cloning a fragment of the amplified promoter region to the plant expression vector. 3. The method of claim 1, wherein the plant expression vector is constructed to have the complete cDNA nucleic acid sequence of SEQ ID NO:2. 4. The method of claim 2, wherein the plant expression vector is constructed to have the complete cDNA nucleic acid sequence of SEQ ID NO:2. 5. The method of claim 4, wherein leaf-stem angles of the genetically transformed rice plants are decreased. 6. The method of claim 1, wherein the plant expression vector is constructed to have the truncated portion of the cDNA with a sequence of base pairs 345 to 639 of SEQ ID NO: 2. 7. The method of claim 6, wherein the plant expression vector is an RNAi vector. 8. The method of claim 7, wherein leaf-stem angles of the genetically transformed rice plants are increased.
3,700
344,409
16,803,853
3,771
or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein A, X1, X2, Q, R1, R2 and n are as defined herein. Such compounds function as thyromimetics and have utility for treating diseases such as neurodegenerative disorders and fibrotic diseases. Pharmaceutical compositions containing such compounds are also provided, as are methods of their use and preparation.
1. A compound having the structure of Formula (I): 2-3. (canceled) 4. The compound of claim 1, wherein Q is a bond and having the structure of Formula (II): 5-6. (canceled) 7. The compound of claim 1, wherein A is phenyl and having the structure of Formula (III): 8-10. (canceled) 11. The compound of claim 1 having the structure of Formula (IV): 12-13. (canceled) 14. The compound of claim 1, wherein Q is —C(R3R4)— and having the structure of Formula (V): 15-16. (canceled) 17. The compound of claim 1, having the structure of Formula (VI): 18-19. (canceled) 20. The compound of claim 1, having the structure of Formula (VII): 21-22. (canceled) 23. The compound of claim 1, having the structure of Formula (VIII): 24-25. (canceled) 26. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein R3 is H, carbocycle, lower alkyl, or —ORa. 27-31. (canceled) 32. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein R1a is lower alkyl. 33. The compound of claim 32, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein R1a is methyl. 34. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein R1b is H. 35. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein R1c is H or lower alkyl. 36. (canceled) 37. The compound of claim 35, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein R1c is methyl. 38. (canceled) 39. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein X1 is methyl. 40. (canceled) 41. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein X1 is Cl or Br. 42-44. (canceled) 45. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein X1 is —CF3. 46. (canceled) 47. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein X2 is methyl. 48. (canceled) 49. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein X2 is Cl or Br. 50-52. (canceled) 53. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein X2 is —CF3. 54. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is lower alkyl. 55. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is lower alkyl substituted with —OR′, wherein R′ is H or lower alkyl. 56-57. (canceled) 58. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is lower haloalkyl. 59. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is —ORa. 60-61. (canceled) 62. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is —C(O)Ra. 63. (canceled) 64. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is —NRaC(O)Rb. 65. The compound of claim 64, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein Ra is H and Rb is lower alkyl. 66. (canceled) 67. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is —C(O)ORa. 68-69. (canceled) 70. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is —S(O)2Ra. 71-72. (canceled) 73. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is halo. 74. The compound of claim 73, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is F. 75. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is cyano. 76. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, having the structure of any one of the following compounds: 77. A pharmaceutical composition comprising a compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, and a pharmaceutically acceptable excipient. 78. A method of treating a subject having a neurodegenerative disease comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically salt or composition thereof. 79-81. (canceled) 82. The method of claim 78, wherein the neurodegenerative disease is multiple sclerosis, MCT8 deficiency, X-linked adrenoleukodystrophy (ALD), amyotrophic lateral sclerosis (ALS), Alzheimer's disease, frontotemporal dementia, or lacunar stroke. 83. (canceled) 84. A method of treating a subject having a medical condition associated with over-expression of TGF-β comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically salt or composition thereof. 85-86. (canceled) 87. A method of treating a subject having adult Refsum disease, infantile Refsum disease, Alexander disease, Alzheimer's disease, Balo concentric sclerosis, Canavan disease, central pontine myelinolysis (CPM), cerebral palsy, cerebrotendineous xanthomatosis, chronic inflammatory demyelinating polyneuropathy (CIDP), Devic's syndrome, diffuse myelinoclastic sclerosis, encephalomyelitis, idiopathic inflammatory demyelinating disease (IIDD), Krabbe disease, Leber hereditary optic neuropathy, leukodystrophy, Marburg multiple sclerosis, Marchiafava-Bignami disease, metachromatic leukodystrophy (MLD), multifocal motor neuropathy (MMN), multiple sclerosis (MS), paraproteinemic demyelinating polyneuropathy, Pelizaeus-Merzbacher disease (PMD), progressive multifocal leukoencephaalopathy (PML), tropical spastic paraparesis (TSP), X-linked adrenoleukodystrophy (X-ALD, ALO, or X-linked ALO), Zellweger syndrome, MCT8 deficiency, amyotrophic lateral sclerosis (ALS), frontotemporal dementia, lacunar stroke, primary age-related tauopathy (PART), Pick's disease, frontotemporal dementia and parkinsonism linked to chromosome 17 (FTDP-17), adrenomyeloneuropathy (AMN), cerebral form of adrenoleukodystrophy (cALD), nonalcoholic steatohepatitis (NASH), idiopathic pulmonary fibrosis (IPF), systemic scleroderma, or Alport syndrome, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 88. A method of treating a subject having NASH, NAFLD, NAFLD with hyperlipidemia, alcoholic liver disease/alcoholic steatohepatitis, liver fibrosis associated with viral infection (HBV, HCV), fibrosis associated with cholestatic diseases (primary biliary cholangitis, primary sclerosing cholangitis), (familial) hypercholesterolemia, dyslipidemia, genetic lipid disorders, cirrhosis, alcohol-induced fibrosis, hemochromatosis, glycogen storage diseases, alpha-1 antitrypsin deficiency, autoimmune hepatitis, Wilson's disease, Crigler-Najjar Syndrome, lysosomal acid lipase deficiency, liver disease in cystic fibrosis, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 89. A method of treating a subject having Alport syndrome, diabetic nephropathy, FSGS, fibrosis associated with IgA nephropathy, chronic kidney diseases (CKD), post AKI, HIV associated CKD, chemotherapy induced CKD, CKD associated with nephrotoxic agents, nephrogenic systemic fibrosis, tubulointerstitial fibrosis, glomerulosclerosis, or polycystic kidney disease (PKD), the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 90. A method of treating a subject having IPF, ILD, pulmonary fibrosis, pulmonary fibrosis associated with autoimmune diseases like rheumatoid arthritis, scleroderma or Sjogren's syndrome, asthma-related pulmonary fibrosis, COPD, asbestos or silica induced PF, silicosis, respiratory bronchiolitis, Idiopathic interstitial pneumonias (IIP), Idiopathic nonspecific interstitial pneumonia, Respiratory bronchiolitis-interstitial lung disease, desquamative interstitial pneumonia, acute interstitial pneumonia, Rare IIPs: Idiopathic lymphoid interstitial pneumonia, idiopathic pleuroparenchymal fibroelastosis, unclassifiable idiopathic interstitial pneumonias, hypersensitivity pneumonitis, radiation-induced lung injury, progressive massive fibrosis-pneumoconiosis, bronchiectasis, byssinosis, chronic respiratory disease, chronic obstructive pulmonary disease (COPD), emphysema, pulmonary arterial hypertension (PAH), or Cystic fibrosis, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 91. A method of treating a subject having scleroderma/systemic sclerosis, graft versus host disease, hypertrophic scars, keloids, nephrogenic systemic fibrosis, porphyria cutanea tarda, restrictive dermopathy, Dupuytren's contracture, dermal fibrosis, nephrogenic systemic fibrosis/nephrogenic fibrosing dermopathy, mixed connective tissue disease, scleromyxedema, eosinophilic fasciitis, fibrosis caused by exposure to chemicals or physical agents. GvHD induced fibrosis, Scleredema adultorum, Lipodermatosclerosis, or Progeroid disorders (progeria, acrogeria, Werner's syndrome), the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 92. A method of treating a subject having atrial fibrosis, endomyocardial fibrosis, cardiac fibrosis, atherosclerosis, restenosis, or arthrofibrosis, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 93. A method of treating a subject having mediastinal fibrosis, myelofibrosis, post-polycythermia vera myelofibrosis, or post essential thrombocythemia, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 94. A method of treating a subject having Crohn's disease, retroperitoneal fibrosis, intestinal fibrosis, fibrosis in inflammatory bowel disease, ulcerative colitis, GI fibrosis due to cystic fibrosis, or pancreatic fibrosis due to pancreatitis, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 95. A method of treating a subject having endometrial fibrosis, uterine fibroids, or Peyronie's disease, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 96. A method of treating a subject having macular degeneration, diabetic retinopathy, retinal fibrovascular diseases, or vitreal retinopathy, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 97. A method of treating a subject having scarring associated with trauma, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 98-119. (canceled)
or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein A, X1, X2, Q, R1, R2 and n are as defined herein. Such compounds function as thyromimetics and have utility for treating diseases such as neurodegenerative disorders and fibrotic diseases. Pharmaceutical compositions containing such compounds are also provided, as are methods of their use and preparation.1. A compound having the structure of Formula (I): 2-3. (canceled) 4. The compound of claim 1, wherein Q is a bond and having the structure of Formula (II): 5-6. (canceled) 7. The compound of claim 1, wherein A is phenyl and having the structure of Formula (III): 8-10. (canceled) 11. The compound of claim 1 having the structure of Formula (IV): 12-13. (canceled) 14. The compound of claim 1, wherein Q is —C(R3R4)— and having the structure of Formula (V): 15-16. (canceled) 17. The compound of claim 1, having the structure of Formula (VI): 18-19. (canceled) 20. The compound of claim 1, having the structure of Formula (VII): 21-22. (canceled) 23. The compound of claim 1, having the structure of Formula (VIII): 24-25. (canceled) 26. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein R3 is H, carbocycle, lower alkyl, or —ORa. 27-31. (canceled) 32. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein R1a is lower alkyl. 33. The compound of claim 32, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein R1a is methyl. 34. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein R1b is H. 35. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein R1c is H or lower alkyl. 36. (canceled) 37. The compound of claim 35, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein R1c is methyl. 38. (canceled) 39. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein X1 is methyl. 40. (canceled) 41. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein X1 is Cl or Br. 42-44. (canceled) 45. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein X1 is —CF3. 46. (canceled) 47. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein X2 is methyl. 48. (canceled) 49. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein X2 is Cl or Br. 50-52. (canceled) 53. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein X2 is —CF3. 54. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is lower alkyl. 55. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is lower alkyl substituted with —OR′, wherein R′ is H or lower alkyl. 56-57. (canceled) 58. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is lower haloalkyl. 59. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is —ORa. 60-61. (canceled) 62. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is —C(O)Ra. 63. (canceled) 64. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is —NRaC(O)Rb. 65. The compound of claim 64, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein Ra is H and Rb is lower alkyl. 66. (canceled) 67. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is —C(O)ORa. 68-69. (canceled) 70. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is —S(O)2Ra. 71-72. (canceled) 73. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is halo. 74. The compound of claim 73, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is F. 75. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, wherein at least one R2 is cyano. 76. The compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, having the structure of any one of the following compounds: 77. A pharmaceutical composition comprising a compound of claim 1, or a pharmaceutically acceptable isomer, racemate, hydrate, solvate, isotope, or salt thereof, and a pharmaceutically acceptable excipient. 78. A method of treating a subject having a neurodegenerative disease comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically salt or composition thereof. 79-81. (canceled) 82. The method of claim 78, wherein the neurodegenerative disease is multiple sclerosis, MCT8 deficiency, X-linked adrenoleukodystrophy (ALD), amyotrophic lateral sclerosis (ALS), Alzheimer's disease, frontotemporal dementia, or lacunar stroke. 83. (canceled) 84. A method of treating a subject having a medical condition associated with over-expression of TGF-β comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically salt or composition thereof. 85-86. (canceled) 87. A method of treating a subject having adult Refsum disease, infantile Refsum disease, Alexander disease, Alzheimer's disease, Balo concentric sclerosis, Canavan disease, central pontine myelinolysis (CPM), cerebral palsy, cerebrotendineous xanthomatosis, chronic inflammatory demyelinating polyneuropathy (CIDP), Devic's syndrome, diffuse myelinoclastic sclerosis, encephalomyelitis, idiopathic inflammatory demyelinating disease (IIDD), Krabbe disease, Leber hereditary optic neuropathy, leukodystrophy, Marburg multiple sclerosis, Marchiafava-Bignami disease, metachromatic leukodystrophy (MLD), multifocal motor neuropathy (MMN), multiple sclerosis (MS), paraproteinemic demyelinating polyneuropathy, Pelizaeus-Merzbacher disease (PMD), progressive multifocal leukoencephaalopathy (PML), tropical spastic paraparesis (TSP), X-linked adrenoleukodystrophy (X-ALD, ALO, or X-linked ALO), Zellweger syndrome, MCT8 deficiency, amyotrophic lateral sclerosis (ALS), frontotemporal dementia, lacunar stroke, primary age-related tauopathy (PART), Pick's disease, frontotemporal dementia and parkinsonism linked to chromosome 17 (FTDP-17), adrenomyeloneuropathy (AMN), cerebral form of adrenoleukodystrophy (cALD), nonalcoholic steatohepatitis (NASH), idiopathic pulmonary fibrosis (IPF), systemic scleroderma, or Alport syndrome, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 88. A method of treating a subject having NASH, NAFLD, NAFLD with hyperlipidemia, alcoholic liver disease/alcoholic steatohepatitis, liver fibrosis associated with viral infection (HBV, HCV), fibrosis associated with cholestatic diseases (primary biliary cholangitis, primary sclerosing cholangitis), (familial) hypercholesterolemia, dyslipidemia, genetic lipid disorders, cirrhosis, alcohol-induced fibrosis, hemochromatosis, glycogen storage diseases, alpha-1 antitrypsin deficiency, autoimmune hepatitis, Wilson's disease, Crigler-Najjar Syndrome, lysosomal acid lipase deficiency, liver disease in cystic fibrosis, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 89. A method of treating a subject having Alport syndrome, diabetic nephropathy, FSGS, fibrosis associated with IgA nephropathy, chronic kidney diseases (CKD), post AKI, HIV associated CKD, chemotherapy induced CKD, CKD associated with nephrotoxic agents, nephrogenic systemic fibrosis, tubulointerstitial fibrosis, glomerulosclerosis, or polycystic kidney disease (PKD), the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 90. A method of treating a subject having IPF, ILD, pulmonary fibrosis, pulmonary fibrosis associated with autoimmune diseases like rheumatoid arthritis, scleroderma or Sjogren's syndrome, asthma-related pulmonary fibrosis, COPD, asbestos or silica induced PF, silicosis, respiratory bronchiolitis, Idiopathic interstitial pneumonias (IIP), Idiopathic nonspecific interstitial pneumonia, Respiratory bronchiolitis-interstitial lung disease, desquamative interstitial pneumonia, acute interstitial pneumonia, Rare IIPs: Idiopathic lymphoid interstitial pneumonia, idiopathic pleuroparenchymal fibroelastosis, unclassifiable idiopathic interstitial pneumonias, hypersensitivity pneumonitis, radiation-induced lung injury, progressive massive fibrosis-pneumoconiosis, bronchiectasis, byssinosis, chronic respiratory disease, chronic obstructive pulmonary disease (COPD), emphysema, pulmonary arterial hypertension (PAH), or Cystic fibrosis, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 91. A method of treating a subject having scleroderma/systemic sclerosis, graft versus host disease, hypertrophic scars, keloids, nephrogenic systemic fibrosis, porphyria cutanea tarda, restrictive dermopathy, Dupuytren's contracture, dermal fibrosis, nephrogenic systemic fibrosis/nephrogenic fibrosing dermopathy, mixed connective tissue disease, scleromyxedema, eosinophilic fasciitis, fibrosis caused by exposure to chemicals or physical agents. GvHD induced fibrosis, Scleredema adultorum, Lipodermatosclerosis, or Progeroid disorders (progeria, acrogeria, Werner's syndrome), the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 92. A method of treating a subject having atrial fibrosis, endomyocardial fibrosis, cardiac fibrosis, atherosclerosis, restenosis, or arthrofibrosis, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 93. A method of treating a subject having mediastinal fibrosis, myelofibrosis, post-polycythermia vera myelofibrosis, or post essential thrombocythemia, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 94. A method of treating a subject having Crohn's disease, retroperitoneal fibrosis, intestinal fibrosis, fibrosis in inflammatory bowel disease, ulcerative colitis, GI fibrosis due to cystic fibrosis, or pancreatic fibrosis due to pancreatitis, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 95. A method of treating a subject having endometrial fibrosis, uterine fibroids, or Peyronie's disease, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 96. A method of treating a subject having macular degeneration, diabetic retinopathy, retinal fibrovascular diseases, or vitreal retinopathy, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 97. A method of treating a subject having scarring associated with trauma, the method comprising administering to the subject in need thereof a pharmaceutically effective amount of the compound of claim 1, or a pharmaceutically acceptable salt or composition thereof. 98-119. (canceled)
3,700
344,410
16,803,886
3,771
Conversation slipstream propagation can include using machine learning to construct a conversations graph representing conversations conducted over an electronic communications network by a plurality of participants and collected from one or more messaging platforms. A conversation slipstream comprising one or more communications extracted from the conversations can be generated in response to receiving a secondary communication over the electronic communications network. Each of the one or more communications extracted is represented by a sub-graph of the conversations graph, each sub-graph corresponding to a graph of the secondary communication. The conversation slipstream can be presented to at least one participant to the secondary communication.
1. A method, comprising: constructing, with computer hardware using machine learning, a conversations graph representing conversations conducted over an electronic communications network by a plurality of participants and collected from at least one messaging platform; generating a conversation slipstream comprising at least one communication extracted from the conversations in response to receiving a secondary communication over the electronic communications network, the at least one communication represented by a sub-graph of the conversations graph that corresponds to a graph of the secondary communication; and presenting the conversation slipstream to at least one participant to the secondary communication. 2. The method of claim 1, wherein the presenting comprises combining the conversation slipstream and secondary communication and presenting the conversation slipstream to the at least one participant in combination with the secondary communication. 3. The method of claim 1, wherein the generating comprises selecting sub-graphs of the conversations graph and comparing each sub-graph selected to the graph of the secondary communication and determining a predefined similarity based on the comparing. 4. The method of claim 3, wherein the selecting comprises determining a primary nodal path of each sub-graph and comparing the primary nodal path of each sub-graph to the graph of the secondary communication. 5. The method of claim 3, wherein the selecting comprises determining: a resolution of a nodal path in each sub-graph; a view number of each communication represented by each sub-graph; or a participation number of each communication represented by each sub-graph. 6. The method of claim 1, further comprising determining a resolution status of the secondary communication and a communication included in the conversation slipstream and inserting the secondary communication into the conversation slipstream at a position within the slipstream wherein the position is selected based on the resolution status of the secondary communication and a communication included in the conversation slipstream. 7. The method of claim 1, wherein the generating comprises selecting the at least one communication based on at least one of a reputation of a participant to a conversation from which the at least one communication is extracted, an expertise of a participant to a conversation from which the at least one communication is extracted, or a sentiment associated with the at least one communication. 8. A system, comprising: a processor configured to initiate operations including: constructing, using machine learning, a conversations graph representing conversations conducted over an electronic communications network by a plurality of participants and collected from at least one messaging platform; generating a conversation slipstream comprising at least one communication extracted from the conversations in response to receiving a secondary communication over the electronic communications network, the at least one communication represented by a sub-graph of the conversations graph that corresponds to a graph of the secondary communication; and presenting the conversation slipstream to at least one participant to the secondary communication. 9. The system of claim 8, wherein the presenting comprises combining the conversation slipstream and secondary communication and presenting the conversation slipstream to the at least one participant in combination with the secondary communication. 10. The system of claim 8, wherein the generating comprises selecting sub-graphs of the conversations graph and comparing each sub-graph selected to the graph of the secondary communication and determining a predefined similarity based on the comparing. 11. The system of claim 10, wherein the selecting comprises determining a primary nodal path of each sub-graph and comparing the primary nodal path of each sub-graph to the graph of the secondary communication. 12. The system of claim 10, wherein the selecting comprises determining: a resolution of a nodal path in each sub-graph; a view number of each communication represented by each sub-graph; or a participation number of each communication represented by each sub-graph. 13. The system of claim 8, wherein the processor is configured to initiate operations further comprising: determining a resolution status of the secondary communication and of a communication included in the conversation slipstream; and inserting the secondary communication into the conversation slipstream at a position within the slipstream wherein the position is selected based on the resolution status of the secondary communication and the communication included in the conversation slipstream. 14. A computer program product, the computer program product comprising: one or more non-transitory computer-readable storage media and program instructions collectively stored on the one or more non-transitory computer-readable storage media, the program instructions executable by a processor to cause the processor to initiate operations including: constructing, using machine learning, a conversations graph representing conversations conducted over an electronic communications network by a plurality of participants and collected from at least one messaging platform; generating a conversation slipstream comprising at least one communication extracted from the conversations in response to receiving a secondary communication over the electronic communications network, the at least one communication represented by a sub-graph of the conversations graph that corresponds to a graph of the secondary communication; and presenting the conversation slipstream to at least one participant to the secondary communication. 15. The computer program product of claim 14, wherein the presenting comprises combining the conversation slipstream and secondary communication and presenting the conversation slipstream to the at least one participant in combination with the secondary communication. 16. The computer program product of claim 14, wherein the generating comprises selecting sub-graphs of the conversations graph and comparing each sub-graph selected to the graph of the secondary communication and determining a predefined similarity based on the comparing. 17. The computer program product of claim 16, wherein the selecting comprises determining a primary nodal path of each sub-graph and comparing the primary nodal path of each sub-graph to the graph of the secondary communication. 18. The computer program product of claim 16, wherein the selecting comprises determining: a resolution of a nodal path in each sub-graph; a view number of each communication represented by each sub-graph; or a participation number of each communication represented by each sub-graph. 19. The computer program product of claim 14, wherein the program instructions are executable by the processor to cause the processor to initiate operations further comprising: determining a resolution status of the secondary communication and of a communication included in the conversation slipstream; and inserting the secondary communication into the conversation slipstream at a position within the slipstream wherein the position is selected based on the resolution status of the secondary communication and the communication included in the conversation slipstream. 20. The computer program product of claim 14, wherein the generating comprises selecting the at least one communication based on at least one of a reputation of a participant to a conversation from which the at least one communication is extracted, an expertise of a participant to a conversation from which the at least one communication is extracted, or a sentiment associated with the at least one communication.
Conversation slipstream propagation can include using machine learning to construct a conversations graph representing conversations conducted over an electronic communications network by a plurality of participants and collected from one or more messaging platforms. A conversation slipstream comprising one or more communications extracted from the conversations can be generated in response to receiving a secondary communication over the electronic communications network. Each of the one or more communications extracted is represented by a sub-graph of the conversations graph, each sub-graph corresponding to a graph of the secondary communication. The conversation slipstream can be presented to at least one participant to the secondary communication.1. A method, comprising: constructing, with computer hardware using machine learning, a conversations graph representing conversations conducted over an electronic communications network by a plurality of participants and collected from at least one messaging platform; generating a conversation slipstream comprising at least one communication extracted from the conversations in response to receiving a secondary communication over the electronic communications network, the at least one communication represented by a sub-graph of the conversations graph that corresponds to a graph of the secondary communication; and presenting the conversation slipstream to at least one participant to the secondary communication. 2. The method of claim 1, wherein the presenting comprises combining the conversation slipstream and secondary communication and presenting the conversation slipstream to the at least one participant in combination with the secondary communication. 3. The method of claim 1, wherein the generating comprises selecting sub-graphs of the conversations graph and comparing each sub-graph selected to the graph of the secondary communication and determining a predefined similarity based on the comparing. 4. The method of claim 3, wherein the selecting comprises determining a primary nodal path of each sub-graph and comparing the primary nodal path of each sub-graph to the graph of the secondary communication. 5. The method of claim 3, wherein the selecting comprises determining: a resolution of a nodal path in each sub-graph; a view number of each communication represented by each sub-graph; or a participation number of each communication represented by each sub-graph. 6. The method of claim 1, further comprising determining a resolution status of the secondary communication and a communication included in the conversation slipstream and inserting the secondary communication into the conversation slipstream at a position within the slipstream wherein the position is selected based on the resolution status of the secondary communication and a communication included in the conversation slipstream. 7. The method of claim 1, wherein the generating comprises selecting the at least one communication based on at least one of a reputation of a participant to a conversation from which the at least one communication is extracted, an expertise of a participant to a conversation from which the at least one communication is extracted, or a sentiment associated with the at least one communication. 8. A system, comprising: a processor configured to initiate operations including: constructing, using machine learning, a conversations graph representing conversations conducted over an electronic communications network by a plurality of participants and collected from at least one messaging platform; generating a conversation slipstream comprising at least one communication extracted from the conversations in response to receiving a secondary communication over the electronic communications network, the at least one communication represented by a sub-graph of the conversations graph that corresponds to a graph of the secondary communication; and presenting the conversation slipstream to at least one participant to the secondary communication. 9. The system of claim 8, wherein the presenting comprises combining the conversation slipstream and secondary communication and presenting the conversation slipstream to the at least one participant in combination with the secondary communication. 10. The system of claim 8, wherein the generating comprises selecting sub-graphs of the conversations graph and comparing each sub-graph selected to the graph of the secondary communication and determining a predefined similarity based on the comparing. 11. The system of claim 10, wherein the selecting comprises determining a primary nodal path of each sub-graph and comparing the primary nodal path of each sub-graph to the graph of the secondary communication. 12. The system of claim 10, wherein the selecting comprises determining: a resolution of a nodal path in each sub-graph; a view number of each communication represented by each sub-graph; or a participation number of each communication represented by each sub-graph. 13. The system of claim 8, wherein the processor is configured to initiate operations further comprising: determining a resolution status of the secondary communication and of a communication included in the conversation slipstream; and inserting the secondary communication into the conversation slipstream at a position within the slipstream wherein the position is selected based on the resolution status of the secondary communication and the communication included in the conversation slipstream. 14. A computer program product, the computer program product comprising: one or more non-transitory computer-readable storage media and program instructions collectively stored on the one or more non-transitory computer-readable storage media, the program instructions executable by a processor to cause the processor to initiate operations including: constructing, using machine learning, a conversations graph representing conversations conducted over an electronic communications network by a plurality of participants and collected from at least one messaging platform; generating a conversation slipstream comprising at least one communication extracted from the conversations in response to receiving a secondary communication over the electronic communications network, the at least one communication represented by a sub-graph of the conversations graph that corresponds to a graph of the secondary communication; and presenting the conversation slipstream to at least one participant to the secondary communication. 15. The computer program product of claim 14, wherein the presenting comprises combining the conversation slipstream and secondary communication and presenting the conversation slipstream to the at least one participant in combination with the secondary communication. 16. The computer program product of claim 14, wherein the generating comprises selecting sub-graphs of the conversations graph and comparing each sub-graph selected to the graph of the secondary communication and determining a predefined similarity based on the comparing. 17. The computer program product of claim 16, wherein the selecting comprises determining a primary nodal path of each sub-graph and comparing the primary nodal path of each sub-graph to the graph of the secondary communication. 18. The computer program product of claim 16, wherein the selecting comprises determining: a resolution of a nodal path in each sub-graph; a view number of each communication represented by each sub-graph; or a participation number of each communication represented by each sub-graph. 19. The computer program product of claim 14, wherein the program instructions are executable by the processor to cause the processor to initiate operations further comprising: determining a resolution status of the secondary communication and of a communication included in the conversation slipstream; and inserting the secondary communication into the conversation slipstream at a position within the slipstream wherein the position is selected based on the resolution status of the secondary communication and the communication included in the conversation slipstream. 20. The computer program product of claim 14, wherein the generating comprises selecting the at least one communication based on at least one of a reputation of a participant to a conversation from which the at least one communication is extracted, an expertise of a participant to a conversation from which the at least one communication is extracted, or a sentiment associated with the at least one communication.
3,700
344,411
16,803,923
2,166
A geographically diverse data storage system that can protect data via replication of data among relevant zones according to a determined replication topology is disclosed. The replication topology can be determined based on replication times between the relevant zones. In an aspect, a tree topology can provide advantages over a star topography. In an embodiment, a tree topology can be generated, or an existing topology can be modified, via selection of a next replication task(s) based on the replication times. In an aspect, the replication times can be determined from measurable characteristics of the geographically diverse data storage system. In some embodiments, the replications times can be based on historical measurements, time limited historical measurements, inferences from machine learning, etc. A determined topology can be ranked relative to other viable topologies based on criteria such as speed, monetary cost, computing resource usage, etc. Accordingly, a selected topology, or selected modification to a topology, can provide for improved replication that can provide protection for data stored in the geographically diverse data storage system.
1. A system, comprising: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: receiving an indication of replication times between a pair of zones comprised in a geographically diverse data storage system comprising a first zone, a second zone, and a third zone; determining a first replication operation between the first zone and the second zone based on a first value of the replication times and adding the first zone and the second zone to a tree set; and determining a second replication operation between a zone of the tree set and the third zone based on a second value of the replication times and adding the third zone to the tree set. 2. The system of claim 1, wherein the first zone is located remotely from the second zone, and wherein the first zone is located remotely from the third zone. 3. The system of claim 1, wherein the second zone is located remotely from the third zone. 4. The system of claim 1, wherein the determining the first replication operation is based on determining the first value of the replication times is lower than another value of the replication times. 5. The system of claim 1, wherein the determining the first replication operation is based on determining the first value of the replication times is the same as another value of the replication times, and based on determining that employing a zone corresponding to the first value results in shorter tree topology than employing another zone corresponding to the other value of the replication times. 6. The system of claim 1, wherein the determining the first replication operation is in response to a determining that a characteristic of the geographically diverse data storage system has transitioned a threshold value. 7. The system of claim 6, wherein the threshold value is a replication time value of the replication times. 8. The system of claim 6, wherein the threshold value is an amount of change in a replication time value of the replication times. 9. The system of claim 1, wherein the operations further comprise iteratively determining another replication operation between a zone of the tree set and another zone of the geographically diverse data storage system based on a another value of the replication times and adding the other zone to the tree set, wherein the iteratively determining another replication operation continues while there are relevant zones of the geographically diverse data storage system to be added to the tree set, and wherein the iteratively determining another replication operation results in topology scheme. 10. The system of claim 9, wherein the topology scheme is ranked among other viable topology schemes. 11. The system of claim 10, wherein a selected topology scheme is applied to generating a protection set via replication of data among zones comprised in the tree set, wherein the selected topology is selected from among viable topology schema based on a rank of the selected topology scheme, and wherein the viable topology schema comprise the topology scheme and the other viable topology schema. 12. The system of claim 9, wherein the iteratively determining another replication operation between a zone of the tree set and another zone results in a third replication operation that occurs in parallel with the second replication operation. 13. A method, comprising: performing, by a system comprising a processor, a first iteration of operations comprising: in response to receiving, by a system comprising a processor, an indication of replication times between a pair of zones comprised in a geographically diverse data storage system comprising a first zone, a second zone, and a third zone, determining a first replication operation between the first zone and the second zone based on a first value of the replication times and adding the first zone and the second zone to a tree set; and determining, by the system, a second replication operation between a zone of the tree set and the third zone based on a second value of the replication times and adding the third zone to the tree set. 14. The method of claim 13, wherein the operations further comprise: in response to determining, by the system, that there is a relevant zone of the geographically diverse data storage system to be added to the tree set, iteratively determining at least another replication operation between a zone of the tree set and at least another zone of the geographically diverse data storage system based on at least another value of the replication times and adding at least the other zone to the tree set, resulting in in topology scheme of viable topology schemes. 15. The method of claim 14, wherein the iteratively determining at least the other replication operation results in a third replication operation that occurs in parallel with the second replication operation. 16. The method of claim 13, wherein the determining the first replication operation results in the first replication operation being between remotely located zones. 17. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising: determining that an indication of replication times between a pair of zones comprised in a geographically diverse data storage system comprising a first zone, a second zone, and a third zone, satisfies a rule related to a threshold value; determining a first replication operation between the first zone and the second zone based on a first value of the replication times and adding the first zone and the second zone to a tree set; determining a second replication operation between a zone of the tree set and the third zone based on a second value of the replication times and adding the third zone to the tree set; and applying a resulting topological scheme of viable topological schema, based on a ranking of the resulting topological scheme among the viable topological schema, resulting in generating a protection set via replication of data among zones comprised in the tree set based on replication operations comprised in the resulting topological scheme. 18. The machine-readable storage medium of claim 17, wherein the operations further comprise: iteratively determining at least another replication operation between a zone of the tree set and at least another zone of the geographically diverse data storage system based on at least another value of the replication times and adding at least the other zone to the tree set. 19. The machine-readable storage medium of claim 18, wherein the iteratively determining at least the other replication operation results in a third replication operation that occurs in parallel with the second replication operation. 20. The machine-readable storage medium of claim 17, wherein the first zone is remotely located from the second zone.
A geographically diverse data storage system that can protect data via replication of data among relevant zones according to a determined replication topology is disclosed. The replication topology can be determined based on replication times between the relevant zones. In an aspect, a tree topology can provide advantages over a star topography. In an embodiment, a tree topology can be generated, or an existing topology can be modified, via selection of a next replication task(s) based on the replication times. In an aspect, the replication times can be determined from measurable characteristics of the geographically diverse data storage system. In some embodiments, the replications times can be based on historical measurements, time limited historical measurements, inferences from machine learning, etc. A determined topology can be ranked relative to other viable topologies based on criteria such as speed, monetary cost, computing resource usage, etc. Accordingly, a selected topology, or selected modification to a topology, can provide for improved replication that can provide protection for data stored in the geographically diverse data storage system.1. A system, comprising: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: receiving an indication of replication times between a pair of zones comprised in a geographically diverse data storage system comprising a first zone, a second zone, and a third zone; determining a first replication operation between the first zone and the second zone based on a first value of the replication times and adding the first zone and the second zone to a tree set; and determining a second replication operation between a zone of the tree set and the third zone based on a second value of the replication times and adding the third zone to the tree set. 2. The system of claim 1, wherein the first zone is located remotely from the second zone, and wherein the first zone is located remotely from the third zone. 3. The system of claim 1, wherein the second zone is located remotely from the third zone. 4. The system of claim 1, wherein the determining the first replication operation is based on determining the first value of the replication times is lower than another value of the replication times. 5. The system of claim 1, wherein the determining the first replication operation is based on determining the first value of the replication times is the same as another value of the replication times, and based on determining that employing a zone corresponding to the first value results in shorter tree topology than employing another zone corresponding to the other value of the replication times. 6. The system of claim 1, wherein the determining the first replication operation is in response to a determining that a characteristic of the geographically diverse data storage system has transitioned a threshold value. 7. The system of claim 6, wherein the threshold value is a replication time value of the replication times. 8. The system of claim 6, wherein the threshold value is an amount of change in a replication time value of the replication times. 9. The system of claim 1, wherein the operations further comprise iteratively determining another replication operation between a zone of the tree set and another zone of the geographically diverse data storage system based on a another value of the replication times and adding the other zone to the tree set, wherein the iteratively determining another replication operation continues while there are relevant zones of the geographically diverse data storage system to be added to the tree set, and wherein the iteratively determining another replication operation results in topology scheme. 10. The system of claim 9, wherein the topology scheme is ranked among other viable topology schemes. 11. The system of claim 10, wherein a selected topology scheme is applied to generating a protection set via replication of data among zones comprised in the tree set, wherein the selected topology is selected from among viable topology schema based on a rank of the selected topology scheme, and wherein the viable topology schema comprise the topology scheme and the other viable topology schema. 12. The system of claim 9, wherein the iteratively determining another replication operation between a zone of the tree set and another zone results in a third replication operation that occurs in parallel with the second replication operation. 13. A method, comprising: performing, by a system comprising a processor, a first iteration of operations comprising: in response to receiving, by a system comprising a processor, an indication of replication times between a pair of zones comprised in a geographically diverse data storage system comprising a first zone, a second zone, and a third zone, determining a first replication operation between the first zone and the second zone based on a first value of the replication times and adding the first zone and the second zone to a tree set; and determining, by the system, a second replication operation between a zone of the tree set and the third zone based on a second value of the replication times and adding the third zone to the tree set. 14. The method of claim 13, wherein the operations further comprise: in response to determining, by the system, that there is a relevant zone of the geographically diverse data storage system to be added to the tree set, iteratively determining at least another replication operation between a zone of the tree set and at least another zone of the geographically diverse data storage system based on at least another value of the replication times and adding at least the other zone to the tree set, resulting in in topology scheme of viable topology schemes. 15. The method of claim 14, wherein the iteratively determining at least the other replication operation results in a third replication operation that occurs in parallel with the second replication operation. 16. The method of claim 13, wherein the determining the first replication operation results in the first replication operation being between remotely located zones. 17. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising: determining that an indication of replication times between a pair of zones comprised in a geographically diverse data storage system comprising a first zone, a second zone, and a third zone, satisfies a rule related to a threshold value; determining a first replication operation between the first zone and the second zone based on a first value of the replication times and adding the first zone and the second zone to a tree set; determining a second replication operation between a zone of the tree set and the third zone based on a second value of the replication times and adding the third zone to the tree set; and applying a resulting topological scheme of viable topological schema, based on a ranking of the resulting topological scheme among the viable topological schema, resulting in generating a protection set via replication of data among zones comprised in the tree set based on replication operations comprised in the resulting topological scheme. 18. The machine-readable storage medium of claim 17, wherein the operations further comprise: iteratively determining at least another replication operation between a zone of the tree set and at least another zone of the geographically diverse data storage system based on at least another value of the replication times and adding at least the other zone to the tree set. 19. The machine-readable storage medium of claim 18, wherein the iteratively determining at least the other replication operation results in a third replication operation that occurs in parallel with the second replication operation. 20. The machine-readable storage medium of claim 17, wherein the first zone is remotely located from the second zone.
2,100
344,412
16,803,830
2,166
A computer-implemented identity verification method includes: receiving, by a payment platform, a verification request including a request to verify a user identity associated with a bank card; generating a first code string; storing the first code string in association with a user identifier and with a card identifier of the bank card; sending a deduction request to a card issuer of the bank card, in which the deduction request includes a request to deduct a first amount from an account associated with the bank card, and in which the deduction request includes the first code string; receiving a second code string; verifying that the second code string is consistent with a corresponding part of the first code string; and based on verifying that the second code string is consistent with the corresponding part of the first code string, verifying the user identity associated with the bank card.
1. A computer-implemented identity verification method, comprising: receiving, by a payment platform, a payment request associated with a bank card; determining, by the payment platform, that the payment request represents a security risk; based on determining that the payment request represents a security risk, sending, by the payment platform, to a user-device, a first electronic notification, the first electronic notification comprising a first interactive element invocable to direct an application of the user-device to an identity verification page, wherein the identity verification page comprises a second interactive element invocable to send a verification request to the payment platform; receiving, by the payment platform, the verification request, comprising a user identifier, a request to verify a user identity associated with the bank card, and a card identifier of the bank card; generating, by the payment platform, a first code string; storing, by the payment platform, the first code string in association with the user identifier and with the card identifier of the bank card; sending, by the payment platform, a deduction request to a card issuer of the bank card, wherein the deduction request comprises a request to deduct a first amount from an account associated with the bank card, and wherein the deduction request comprises the first code string; receiving, by the payment platform, from the user-device, a second code string; verifying, by the payment platform, that the second code string is consistent with a corresponding part of the first code string, comprising comparing the second code string to the corresponding part of the first code string; and based on verifying that the second code string matches the corresponding part of the first code string, verifying, by the payment platform, the user identity associated with the bank card. 2. The computer-implemented method of claim 1, wherein generating the first code string comprises: forming, by the payment platform, a first character string based on at least one of: the user identifier, the card identifier of the bank card, and a current time; and performing, by the payment platform, a hash operation on the first character string, and obtaining the first code string as a result of the hash operation. 3. The computer-implemented method of claim 1, wherein the first amount corresponds to a minimum payment unit of a currency. 4. The computer-implemented method of claim 1, wherein the first code string is in a field of the deduction request, such that the first code string is included in a corresponding field of a bill generated by the card issuer. 5. The computer-implemented method of claim 1, further comprising: prompting, by the payment platform, a user associated with the user identity to enter, as the second code string, a code string in a specific location in a bill received by the user from the card issuer. 6. The computer-implemented method of claim 1, further comprising, subsequent to verifying the user identity associated with the bank card: sending, by the payment platform, a notification indicating a verification success. 7. The computer-implemented method of claim 1, further comprising, prior to receiving the verification request: suspending, by the payment platform, the payment request; and further comprising, subsequent to verifying the user identity associated with the bank card: processing, by the payment platform, the payment request. 8. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising: receiving, by a payment platform, a payment request associated with a bank card; determining, by the payment platform, that the payment request represents a security risk; based on determining that the payment request represents a security risk, sending, by the payment platform, to a user-device, a first electronic notification, the first electronic notification comprising a first interactive element invocable to direct an application of the user-device to an identity verification page, wherein the identity verification page comprises a second interactive element invocable to send a verification request to the payment platform; receiving, by the payment platform, the verification request, comprising a user identifier, a request to verify a user identity associated with the bank card, and a card identifier of the bank card; generating, by the payment platform, a first code string; storing, by the payment platform, the first code string in association with the user identifier and with the card identifier of the bank card; sending, by the payment platform, a deduction request to a card issuer of the bank card, wherein the deduction request comprises a request to deduct a first amount from an account associated with the bank card, and wherein the deduction request comprises the first code string; receiving, by the payment platform, from the user-device, a second code string; verifying, by the payment platform, that the second code string is consistent with a corresponding part of the first code string, comprising comparing the second code string to the corresponding part of the first code string; and based on verifying that the second code string matches the corresponding part of the first code string, verifying, by the payment platform, the user identity associated with the bank card. 9. The computer-readable medium of claim 8, wherein generating the first code string comprises: forming, by the payment platform, a first character string based on at least one of: the user identifier, the card identifier of the bank card, and a current time; and performing, by the payment platform, a hash operation on the first character string, and obtaining the first code string as a result of the hash operation. 10. The computer-readable medium of claim 8, wherein the first amount corresponds to a minimum payment unit of a currency. 11. The computer-readable medium of claim 8, wherein the first code string is in a field of the deduction request, such that the first code string is included in a corresponding field of a bill generated by the card issuer. 12. The computer-readable medium of claim 8, wherein the operations further comprise: prompting, by the payment platform, a user associated with the user identity to enter, as the second code string, a code string in a specific location in a bill received by the user from the card issuer. 13. The computer-readable medium of claim 8, wherein the operations further comprise, subsequent to verifying the user identity associated with the bank card: sending, by the payment platform, a notification indicating a verification success. 14. The computer-readable medium of claim 8, wherein the operations further comprise, prior to receiving the verification request: suspending, by the payment platform, the payment request; and further comprising, subsequent to verifying the user identity associated with the bank card: processing, by the payment platform, the payment request. 15. A computer-implemented system, comprising: one or more computers; and one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations comprising: receiving, by a payment platform, a payment request associated with a bank card; determining, by the payment platform, that the payment request represents a security risk; based on determining that the payment request represents a security risk, sending, by the payment platform, to a user-device, a first electronic notification, the first electronic notification comprising a first interactive element invocable to direct an application of the user-device to an identity verification page, wherein the identity verification page comprises a second interactive element invocable to send a verification request to the payment platform; receiving, by the payment platform, the verification request, comprising a user identifier, a request to verify a user identity associated with the bank card, and a card identifier of the bank card; generating, by the payment platform, a first code string; storing, by the payment platform, the first code string in association with the user identifier and with the card identifier of the bank card; sending, by the payment platform, a deduction request to a card issuer of the bank card, wherein the deduction request comprises a request to deduct a first amount from an account associated with the bank card, and wherein the deduction request comprises the first code string; receiving, by the payment platform, from the user-device, a second code string; verifying, by the payment platform, that the second code string is consistent with a corresponding part of the first code string, comprising comparing the second code string to the corresponding part of the first code string; and based on verifying that the second code string matches the corresponding part of the first code string, verifying, by the payment platform, the user identity associated with the bank card. 16. The computer-implemented system of claim 15, wherein generating the first code string comprises: forming, by the payment platform, a first character string based on at least one of: the user identifier, the card identifier of the bank card, and a current time; and performing, by the payment platform, a hash operation on the first character string, and obtaining the first code string as a result of the hash operation. 17. The computer-implemented system of claim 15, wherein the first amount corresponds to a minimum payment unit of a currency. 18. The computer-implemented system of claim 15, wherein the first code string is in a field of the deduction request, such that the first code string is included in a corresponding field of a bill generated by the card issuer. 19. The computer-implemented system of claim 15, wherein the operations further comprise: prompting, by the payment platform, a user associated with the user identity to enter, as the second code string, a code string in a specific location in a bill received by the user from the card issuer. 20. The computer-implemented system of claim 15, wherein the operations further comprise, prior to receiving the verification request: suspending, by the payment platform, the payment request; and further comprising, subsequent to verifying the user identity associated with the bank card: processing, by the payment platform, the payment request.
A computer-implemented identity verification method includes: receiving, by a payment platform, a verification request including a request to verify a user identity associated with a bank card; generating a first code string; storing the first code string in association with a user identifier and with a card identifier of the bank card; sending a deduction request to a card issuer of the bank card, in which the deduction request includes a request to deduct a first amount from an account associated with the bank card, and in which the deduction request includes the first code string; receiving a second code string; verifying that the second code string is consistent with a corresponding part of the first code string; and based on verifying that the second code string is consistent with the corresponding part of the first code string, verifying the user identity associated with the bank card.1. A computer-implemented identity verification method, comprising: receiving, by a payment platform, a payment request associated with a bank card; determining, by the payment platform, that the payment request represents a security risk; based on determining that the payment request represents a security risk, sending, by the payment platform, to a user-device, a first electronic notification, the first electronic notification comprising a first interactive element invocable to direct an application of the user-device to an identity verification page, wherein the identity verification page comprises a second interactive element invocable to send a verification request to the payment platform; receiving, by the payment platform, the verification request, comprising a user identifier, a request to verify a user identity associated with the bank card, and a card identifier of the bank card; generating, by the payment platform, a first code string; storing, by the payment platform, the first code string in association with the user identifier and with the card identifier of the bank card; sending, by the payment platform, a deduction request to a card issuer of the bank card, wherein the deduction request comprises a request to deduct a first amount from an account associated with the bank card, and wherein the deduction request comprises the first code string; receiving, by the payment platform, from the user-device, a second code string; verifying, by the payment platform, that the second code string is consistent with a corresponding part of the first code string, comprising comparing the second code string to the corresponding part of the first code string; and based on verifying that the second code string matches the corresponding part of the first code string, verifying, by the payment platform, the user identity associated with the bank card. 2. The computer-implemented method of claim 1, wherein generating the first code string comprises: forming, by the payment platform, a first character string based on at least one of: the user identifier, the card identifier of the bank card, and a current time; and performing, by the payment platform, a hash operation on the first character string, and obtaining the first code string as a result of the hash operation. 3. The computer-implemented method of claim 1, wherein the first amount corresponds to a minimum payment unit of a currency. 4. The computer-implemented method of claim 1, wherein the first code string is in a field of the deduction request, such that the first code string is included in a corresponding field of a bill generated by the card issuer. 5. The computer-implemented method of claim 1, further comprising: prompting, by the payment platform, a user associated with the user identity to enter, as the second code string, a code string in a specific location in a bill received by the user from the card issuer. 6. The computer-implemented method of claim 1, further comprising, subsequent to verifying the user identity associated with the bank card: sending, by the payment platform, a notification indicating a verification success. 7. The computer-implemented method of claim 1, further comprising, prior to receiving the verification request: suspending, by the payment platform, the payment request; and further comprising, subsequent to verifying the user identity associated with the bank card: processing, by the payment platform, the payment request. 8. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising: receiving, by a payment platform, a payment request associated with a bank card; determining, by the payment platform, that the payment request represents a security risk; based on determining that the payment request represents a security risk, sending, by the payment platform, to a user-device, a first electronic notification, the first electronic notification comprising a first interactive element invocable to direct an application of the user-device to an identity verification page, wherein the identity verification page comprises a second interactive element invocable to send a verification request to the payment platform; receiving, by the payment platform, the verification request, comprising a user identifier, a request to verify a user identity associated with the bank card, and a card identifier of the bank card; generating, by the payment platform, a first code string; storing, by the payment platform, the first code string in association with the user identifier and with the card identifier of the bank card; sending, by the payment platform, a deduction request to a card issuer of the bank card, wherein the deduction request comprises a request to deduct a first amount from an account associated with the bank card, and wherein the deduction request comprises the first code string; receiving, by the payment platform, from the user-device, a second code string; verifying, by the payment platform, that the second code string is consistent with a corresponding part of the first code string, comprising comparing the second code string to the corresponding part of the first code string; and based on verifying that the second code string matches the corresponding part of the first code string, verifying, by the payment platform, the user identity associated with the bank card. 9. The computer-readable medium of claim 8, wherein generating the first code string comprises: forming, by the payment platform, a first character string based on at least one of: the user identifier, the card identifier of the bank card, and a current time; and performing, by the payment platform, a hash operation on the first character string, and obtaining the first code string as a result of the hash operation. 10. The computer-readable medium of claim 8, wherein the first amount corresponds to a minimum payment unit of a currency. 11. The computer-readable medium of claim 8, wherein the first code string is in a field of the deduction request, such that the first code string is included in a corresponding field of a bill generated by the card issuer. 12. The computer-readable medium of claim 8, wherein the operations further comprise: prompting, by the payment platform, a user associated with the user identity to enter, as the second code string, a code string in a specific location in a bill received by the user from the card issuer. 13. The computer-readable medium of claim 8, wherein the operations further comprise, subsequent to verifying the user identity associated with the bank card: sending, by the payment platform, a notification indicating a verification success. 14. The computer-readable medium of claim 8, wherein the operations further comprise, prior to receiving the verification request: suspending, by the payment platform, the payment request; and further comprising, subsequent to verifying the user identity associated with the bank card: processing, by the payment platform, the payment request. 15. A computer-implemented system, comprising: one or more computers; and one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations comprising: receiving, by a payment platform, a payment request associated with a bank card; determining, by the payment platform, that the payment request represents a security risk; based on determining that the payment request represents a security risk, sending, by the payment platform, to a user-device, a first electronic notification, the first electronic notification comprising a first interactive element invocable to direct an application of the user-device to an identity verification page, wherein the identity verification page comprises a second interactive element invocable to send a verification request to the payment platform; receiving, by the payment platform, the verification request, comprising a user identifier, a request to verify a user identity associated with the bank card, and a card identifier of the bank card; generating, by the payment platform, a first code string; storing, by the payment platform, the first code string in association with the user identifier and with the card identifier of the bank card; sending, by the payment platform, a deduction request to a card issuer of the bank card, wherein the deduction request comprises a request to deduct a first amount from an account associated with the bank card, and wherein the deduction request comprises the first code string; receiving, by the payment platform, from the user-device, a second code string; verifying, by the payment platform, that the second code string is consistent with a corresponding part of the first code string, comprising comparing the second code string to the corresponding part of the first code string; and based on verifying that the second code string matches the corresponding part of the first code string, verifying, by the payment platform, the user identity associated with the bank card. 16. The computer-implemented system of claim 15, wherein generating the first code string comprises: forming, by the payment platform, a first character string based on at least one of: the user identifier, the card identifier of the bank card, and a current time; and performing, by the payment platform, a hash operation on the first character string, and obtaining the first code string as a result of the hash operation. 17. The computer-implemented system of claim 15, wherein the first amount corresponds to a minimum payment unit of a currency. 18. The computer-implemented system of claim 15, wherein the first code string is in a field of the deduction request, such that the first code string is included in a corresponding field of a bill generated by the card issuer. 19. The computer-implemented system of claim 15, wherein the operations further comprise: prompting, by the payment platform, a user associated with the user identity to enter, as the second code string, a code string in a specific location in a bill received by the user from the card issuer. 20. The computer-implemented system of claim 15, wherein the operations further comprise, prior to receiving the verification request: suspending, by the payment platform, the payment request; and further comprising, subsequent to verifying the user identity associated with the bank card: processing, by the payment platform, the payment request.
2,100
344,413
16,803,898
3,671
A landscape paver includes a PV panel and a frame. The PV panel includes one or more PV cells and is operable to provide electrical power at a panel output terminal in response to operating light incident on a panel upper surface. The frame extends along the panel peripheral edge and defines a frame inside surface which, together with a lower panel surface, defines a base volume. A molded base material is located in the base volume. A light-transmissive paver cover material extends over the panel first surface and over at least a portion of a frame outside surface which faces away from the base volume. The landscape paver may be incorporated in a landscape installation and connected with other such pavers in the installation to provide a ground mounted PV panel array which also functions as a hardscape such as a walkway or patio.
1. A landscape paver including: (a) a PV panel having a panel first surface and a panel second surface with the panel first surface and the panel second surface bounded by a panel peripheral edge, the PV panel being operable to provide electrical power in response to operating light incident on the panel first surface; (b) a rigid frame extending along the panel peripheral edge and having a frame inside surface and a frame outside surface, the frame inside surface together with the panel second surface defining a base volume and the frame outside surface facing away from the base volume; (c) a molded base material located in the base volume, the molded base material including a base material backing surface and a base material lateral surface, the base material backing surface being molded against at least a portion of the panel second surface and the base material lateral surface being molded against at least a portion of the frame inside surface; and (d) a paver cover material extending over the panel first surface, the paver cover material being light-transmissive at least in portions extending over one or more areas of the panel first surface. 2. The landscape paver of claim 1 wherein the rigid frame includes a panel support flange extending from the frame inside surface and defining a peripheral sealing surface abutting a portion of one of the panel first surface and panel second surface. 3. The landscape paver of claim 2 wherein at least a portion of the rigid frame is exposed on a bottom surface of the landscape. 4. The landscape paver of claim 2 wherein the rigid frame includes a panel receiving channel defined between the panel support flange and a panel capture flange surface. 5. The landscape paver of claim 1 further including reinforcing elements embedded in the molded base material and extending substantially parallel to a plane of the PV panel. 6. The landscape paver of claim 1 wherein the paver cover material is a layer of molded material defining a lower cover material surface molded against the panel first surface and defining a cover material inside lateral surface molded against the frame outside surface. 7. The landscape paver of claim 1 wherein the landscape paver defines a paver load receiving surface spaced apart from the panel first surface at least by the paver cover material and further including at least one reduced light transmissivity layer extending transverse to a direction from the paver load receiving surface to the panel first surface, the at least one reduced light transmissivity layer including a light-transmissive material in which is included low-light-transmissivity granular material. 8. The landscape paver of claim 7 wherein the low-light-transmissivity granular material reduces the light transmissivity of the reduced light transmissivity layer by no more than approximately 10%. 9. The landscape paver of claim 7 wherein the low-light-transmissivity granular material is suspended in the reduced light transmissivity layer. 10. The landscape paver of claim 7 wherein the low-light-transmissivity granular material is embedded in the paver load receiving surface. 11. The landscape paver of claim 7 wherein the low-light-transmissivity granular material in at least some of an area of the reduced light transmissivity layer is made up of grains having a maximum dimension of between approximately 10 microns and 7500 microns. 12. The landscape paver of claim 1 wherein the rigid frame includes an electrically conductive material. 13. A landscape paver including: (a) a PV panel having a panel first surface and a panel second surface with the panel first surface and the panel second surface bounded by a panel peripheral edge, the PV panel being operable to provide electrical power in response to operating light incident on the panel first surface; (b) a frame extending along the panel peripheral edge and having a frame inside surface and a frame outside surface, the frame inside surface together with the panel second surface defining a base volume and the frame outside surface facing away from the base volume; (c) a base material located in the base volume, the base material including a base material backing surface and a base material lateral surface, the base material backing surface facing at least a portion of the panel second surface so as to provide support for the PV panel at least in the portion of the panel second surface and the base material lateral surface facing at least a portion of the frame inside surface; and (d) a paver cover material extending over the panel first surface, the paver cover material being light-transmissive at least in portions extending over one or more areas of the panel first surface. 14. The landscape paver of claim 13 wherein the landscape paver defines a paver load receiving surface spaced apart from the panel first surface at least by the paver cover material and further including at least one reduced light transmissivity layer extending transverse to a direction from the paver load receiving surface to the panel first surface, the at least one reduced light transmissivity layer including a light-transmissive material in which is included low-light-transmissivity granular material. 15. The landscape paver of claim 14 wherein the low-light-transmissivity granular material is suspended in the reduced light transmissivity layer. 16. The landscape paver of claim 14 wherein the low-light-transmissivity granular material is embedded in the paver load receiving surface. 17. A landscape paver installation including: (a) a paver supporting bed; (b) two or more landscape pavers supported on the paver supporting bed; and (c) wherein a first landscape paver of the two or more landscape pavers includes, (i) a PV panel having a panel first surface and a panel second surface with the panel first surface and the panel second surface bounded by a panel peripheral edge, the PV panel being operable to provide electrical power in response to operating light incident on the panel first surface and being supported on the paver supporting bed with the panel first surface facing upwardly; (ii) a frame extending along the panel peripheral edge and having a frame inside surface and a frame outside surface, the frame inside surface together with the panel second surface defining a base volume and the frame outside surface facing away from the base volume; (iii) a base material located in the base volume, the base material including a base material backing surface and a base material lateral surface, the base material backing surface facing at least a portion of the panel second surface so as to provide support for the PV panel at least in the portion of the panel second surface and the base material lateral surface facing at least a portion of the frame inside surface; and (iv) a paver cover material extending over the panel first surface, the paver cover material being light-transmissive at least in portions extending over one or more areas of the panel first surface. 18. The landscape paver installation of claim 17 wherein the first landscape paver defines a paver load receiving surface spaced apart from the panel first surface at least by the paver cover material and further including at least one reduced light transmissivity layer extending transverse to a direction from the paver load receiving surface to the panel first surface, the at least one reduced light transmissivity layer including a light-transmissive material in which is included low-light-transmissivity granular material. 19. The landscape paver installation of claim 18 wherein the low-light-transmissivity granular material is suspended in the reduced light transmissivity layer. 20. The landscape paver installation of claim 18 wherein the low-light-transmissivity granular material is embedded in the paver load receiving surface.
A landscape paver includes a PV panel and a frame. The PV panel includes one or more PV cells and is operable to provide electrical power at a panel output terminal in response to operating light incident on a panel upper surface. The frame extends along the panel peripheral edge and defines a frame inside surface which, together with a lower panel surface, defines a base volume. A molded base material is located in the base volume. A light-transmissive paver cover material extends over the panel first surface and over at least a portion of a frame outside surface which faces away from the base volume. The landscape paver may be incorporated in a landscape installation and connected with other such pavers in the installation to provide a ground mounted PV panel array which also functions as a hardscape such as a walkway or patio.1. A landscape paver including: (a) a PV panel having a panel first surface and a panel second surface with the panel first surface and the panel second surface bounded by a panel peripheral edge, the PV panel being operable to provide electrical power in response to operating light incident on the panel first surface; (b) a rigid frame extending along the panel peripheral edge and having a frame inside surface and a frame outside surface, the frame inside surface together with the panel second surface defining a base volume and the frame outside surface facing away from the base volume; (c) a molded base material located in the base volume, the molded base material including a base material backing surface and a base material lateral surface, the base material backing surface being molded against at least a portion of the panel second surface and the base material lateral surface being molded against at least a portion of the frame inside surface; and (d) a paver cover material extending over the panel first surface, the paver cover material being light-transmissive at least in portions extending over one or more areas of the panel first surface. 2. The landscape paver of claim 1 wherein the rigid frame includes a panel support flange extending from the frame inside surface and defining a peripheral sealing surface abutting a portion of one of the panel first surface and panel second surface. 3. The landscape paver of claim 2 wherein at least a portion of the rigid frame is exposed on a bottom surface of the landscape. 4. The landscape paver of claim 2 wherein the rigid frame includes a panel receiving channel defined between the panel support flange and a panel capture flange surface. 5. The landscape paver of claim 1 further including reinforcing elements embedded in the molded base material and extending substantially parallel to a plane of the PV panel. 6. The landscape paver of claim 1 wherein the paver cover material is a layer of molded material defining a lower cover material surface molded against the panel first surface and defining a cover material inside lateral surface molded against the frame outside surface. 7. The landscape paver of claim 1 wherein the landscape paver defines a paver load receiving surface spaced apart from the panel first surface at least by the paver cover material and further including at least one reduced light transmissivity layer extending transverse to a direction from the paver load receiving surface to the panel first surface, the at least one reduced light transmissivity layer including a light-transmissive material in which is included low-light-transmissivity granular material. 8. The landscape paver of claim 7 wherein the low-light-transmissivity granular material reduces the light transmissivity of the reduced light transmissivity layer by no more than approximately 10%. 9. The landscape paver of claim 7 wherein the low-light-transmissivity granular material is suspended in the reduced light transmissivity layer. 10. The landscape paver of claim 7 wherein the low-light-transmissivity granular material is embedded in the paver load receiving surface. 11. The landscape paver of claim 7 wherein the low-light-transmissivity granular material in at least some of an area of the reduced light transmissivity layer is made up of grains having a maximum dimension of between approximately 10 microns and 7500 microns. 12. The landscape paver of claim 1 wherein the rigid frame includes an electrically conductive material. 13. A landscape paver including: (a) a PV panel having a panel first surface and a panel second surface with the panel first surface and the panel second surface bounded by a panel peripheral edge, the PV panel being operable to provide electrical power in response to operating light incident on the panel first surface; (b) a frame extending along the panel peripheral edge and having a frame inside surface and a frame outside surface, the frame inside surface together with the panel second surface defining a base volume and the frame outside surface facing away from the base volume; (c) a base material located in the base volume, the base material including a base material backing surface and a base material lateral surface, the base material backing surface facing at least a portion of the panel second surface so as to provide support for the PV panel at least in the portion of the panel second surface and the base material lateral surface facing at least a portion of the frame inside surface; and (d) a paver cover material extending over the panel first surface, the paver cover material being light-transmissive at least in portions extending over one or more areas of the panel first surface. 14. The landscape paver of claim 13 wherein the landscape paver defines a paver load receiving surface spaced apart from the panel first surface at least by the paver cover material and further including at least one reduced light transmissivity layer extending transverse to a direction from the paver load receiving surface to the panel first surface, the at least one reduced light transmissivity layer including a light-transmissive material in which is included low-light-transmissivity granular material. 15. The landscape paver of claim 14 wherein the low-light-transmissivity granular material is suspended in the reduced light transmissivity layer. 16. The landscape paver of claim 14 wherein the low-light-transmissivity granular material is embedded in the paver load receiving surface. 17. A landscape paver installation including: (a) a paver supporting bed; (b) two or more landscape pavers supported on the paver supporting bed; and (c) wherein a first landscape paver of the two or more landscape pavers includes, (i) a PV panel having a panel first surface and a panel second surface with the panel first surface and the panel second surface bounded by a panel peripheral edge, the PV panel being operable to provide electrical power in response to operating light incident on the panel first surface and being supported on the paver supporting bed with the panel first surface facing upwardly; (ii) a frame extending along the panel peripheral edge and having a frame inside surface and a frame outside surface, the frame inside surface together with the panel second surface defining a base volume and the frame outside surface facing away from the base volume; (iii) a base material located in the base volume, the base material including a base material backing surface and a base material lateral surface, the base material backing surface facing at least a portion of the panel second surface so as to provide support for the PV panel at least in the portion of the panel second surface and the base material lateral surface facing at least a portion of the frame inside surface; and (iv) a paver cover material extending over the panel first surface, the paver cover material being light-transmissive at least in portions extending over one or more areas of the panel first surface. 18. The landscape paver installation of claim 17 wherein the first landscape paver defines a paver load receiving surface spaced apart from the panel first surface at least by the paver cover material and further including at least one reduced light transmissivity layer extending transverse to a direction from the paver load receiving surface to the panel first surface, the at least one reduced light transmissivity layer including a light-transmissive material in which is included low-light-transmissivity granular material. 19. The landscape paver installation of claim 18 wherein the low-light-transmissivity granular material is suspended in the reduced light transmissivity layer. 20. The landscape paver installation of claim 18 wherein the low-light-transmissivity granular material is embedded in the paver load receiving surface.
3,600
344,414
16,803,928
2,471
Adjusting a network path between a user equipment and a network edge cloud instance is disclosed. The adjustment of the network path can be based on performance of the network path. The performance of the network path can be ranked, based on performance, against other network paths. In an embodiment, the other network paths can be between the user equipment and the network edge cloud instance. Additionally, the other network paths can be between the user equipment and another network edge cloud instance that can be located remotely from the network edge cloud instance. In an embodiment, a recommendation can be provided to a cloud service provider to enable the cloud service provider to adjust a characteristic of an application or service performed by a network edge cloud instance. The disclosed subject matter can provide advantages over conventional cloud instances that are typically supported on a device located distant from a network device operated by a network provider.
1. A device, comprising: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations comprising: determining a first network edge cloud path parameter for a first network edge cloud path between a user device and a first edge device supporting a first network edge cloud instance, wherein the first edge device is operated by a network provider and is proximate to a core network device that is also operated by the network provider; and in response to determining that the first network edge cloud path parameter does not satisfy a first rule related to network edge cloud path performance, initiating a change to the first network edge cloud path. 2. The device of claim 1, wherein the operations further comprise determining a first alternate network edge cloud path between the user device and a second edge device supporting a second network edge cloud instance, wherein the initiating the change to the first network edge cloud path results in establishment of a second network edge cloud path between the first user device and the second network edge cloud instance supported by the second edge device, and wherein the second network edge cloud path is based on the first alternate network edge cloud path. 3. The device of claim 2, wherein the first alternate network edge cloud path is selected from alternate network edge cloud paths determined as able to connect the user device to an alternate service equivalent to a service supported by the first network edge cloud instance, wherein the first alternate network edge cloud path is associated with a second network edge cloud path parameter, and wherein the second network edge cloud path parameter is determined to satisfy the first rule related to network edge cloud path performance. 4. The device of claim 2, wherein the second edge device is a same edge device the first edge device. 5. The device of claim 2, wherein the second edge device is a different edge device than the first edge device. 6. The device of claim 5, wherein the second edge device is located remotely from the first edge device. 7. The device of claim 1, wherein the initiating the change to the first network edge cloud path results in the first network edge cloud path parameter satisfying the first rule related to network edge cloud path performance. 8. The device of claim 1, wherein the operations further comprise signaling a service supported by the first network edge cloud instance, and wherein the signaling results in the service altering a performance of the service. 9. The device of claim 8, wherein the signaling that results in the service altering the performance of the service results in the service altering an amount of data being communicated via the first network edge cloud path between the user device and the first edge device supporting the first network edge cloud instance. 10. The device of claim 9, wherein the altering the amount of data being communicated via the first network edge cloud path results from altering a user interface mode of a user interface employed by the service. 11. The device of claim 10, wherein the altering the user interface mode of the user interface employed by the service comprises changing between a voice input modality, presented via the user device by the first network edge cloud instance, and a touch screen modality, presented via the user device by the first network edge cloud instance. 12. A method, comprising: receiving, by a system comprising a processor, a first network edge cloud path metric for a first network edge cloud path between a user device and a first edge device supporting a first network edge cloud instance, wherein the first edge device is proximate to a core network device; determining, by the system, a first property of a second network edge cloud path that is different from a second property of the first network edge cloud path based on a second network edge cloud path metric for a second network edge cloud path; selecting, by the system, the second network edge cloud path based on the first property; and initiating, by the system, a change to the first network edge cloud path based on the second network edge cloud path. 13. The method of claim 12, wherein the determining the first property comprises determining a ranking of the second network edge cloud path based on the second network edge cloud path metric for the second network edge cloud path between the user device and the first edge device supporting the first network edge cloud instance. 14. The method of claim 12, wherein the determining the first property comprises determining a ranking of the second network edge cloud path based on the second network edge cloud path metric for the second network edge cloud path between the user device and a second edge device supporting a second network edge cloud instance. 15. The method of claim 14, wherein the first network edge cloud instance facilitates use of a first application, and wherein the second network edge cloud instance facilitates use of a second application that is a same application as the first application. 16. The method of claim 12, wherein the initiating the change to the first network edge cloud path based on the second network edge cloud path results in establishing a connection between the user device and a second network edge cloud instance executing on a second edge device that is proximate to a second core network device and is also located remotely from the first edge device. 17. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising: determining a first performance of at least a portion of a first network edge cloud path between a user device and a first edge device supporting a first network edge cloud instance, wherein the first edge device is proximate to a core network device, and wherein the processor is comprised in the core network device; in response to determining a difference between a first performance of the first network edge cloud path and a second performance of at least a portion of a second network edge cloud path, selecting the second network edge cloud path based on the difference; and causing an adaptation of the first network edge cloud path based on the second network edge cloud path. 18. The machine-readable storage medium of claim 17, wherein the second network edge cloud path is between the user equipment and the first edge device supporting the first network edge cloud instance. 19. The machine-readable storage medium of claim 17, wherein the second network edge cloud path is between the user equipment and a second edge device supporting a second network edge cloud instance. 20. The machine-readable storage medium of claim 19, wherein the second edge device is located remotely from the first edge device.
Adjusting a network path between a user equipment and a network edge cloud instance is disclosed. The adjustment of the network path can be based on performance of the network path. The performance of the network path can be ranked, based on performance, against other network paths. In an embodiment, the other network paths can be between the user equipment and the network edge cloud instance. Additionally, the other network paths can be between the user equipment and another network edge cloud instance that can be located remotely from the network edge cloud instance. In an embodiment, a recommendation can be provided to a cloud service provider to enable the cloud service provider to adjust a characteristic of an application or service performed by a network edge cloud instance. The disclosed subject matter can provide advantages over conventional cloud instances that are typically supported on a device located distant from a network device operated by a network provider.1. A device, comprising: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations comprising: determining a first network edge cloud path parameter for a first network edge cloud path between a user device and a first edge device supporting a first network edge cloud instance, wherein the first edge device is operated by a network provider and is proximate to a core network device that is also operated by the network provider; and in response to determining that the first network edge cloud path parameter does not satisfy a first rule related to network edge cloud path performance, initiating a change to the first network edge cloud path. 2. The device of claim 1, wherein the operations further comprise determining a first alternate network edge cloud path between the user device and a second edge device supporting a second network edge cloud instance, wherein the initiating the change to the first network edge cloud path results in establishment of a second network edge cloud path between the first user device and the second network edge cloud instance supported by the second edge device, and wherein the second network edge cloud path is based on the first alternate network edge cloud path. 3. The device of claim 2, wherein the first alternate network edge cloud path is selected from alternate network edge cloud paths determined as able to connect the user device to an alternate service equivalent to a service supported by the first network edge cloud instance, wherein the first alternate network edge cloud path is associated with a second network edge cloud path parameter, and wherein the second network edge cloud path parameter is determined to satisfy the first rule related to network edge cloud path performance. 4. The device of claim 2, wherein the second edge device is a same edge device the first edge device. 5. The device of claim 2, wherein the second edge device is a different edge device than the first edge device. 6. The device of claim 5, wherein the second edge device is located remotely from the first edge device. 7. The device of claim 1, wherein the initiating the change to the first network edge cloud path results in the first network edge cloud path parameter satisfying the first rule related to network edge cloud path performance. 8. The device of claim 1, wherein the operations further comprise signaling a service supported by the first network edge cloud instance, and wherein the signaling results in the service altering a performance of the service. 9. The device of claim 8, wherein the signaling that results in the service altering the performance of the service results in the service altering an amount of data being communicated via the first network edge cloud path between the user device and the first edge device supporting the first network edge cloud instance. 10. The device of claim 9, wherein the altering the amount of data being communicated via the first network edge cloud path results from altering a user interface mode of a user interface employed by the service. 11. The device of claim 10, wherein the altering the user interface mode of the user interface employed by the service comprises changing between a voice input modality, presented via the user device by the first network edge cloud instance, and a touch screen modality, presented via the user device by the first network edge cloud instance. 12. A method, comprising: receiving, by a system comprising a processor, a first network edge cloud path metric for a first network edge cloud path between a user device and a first edge device supporting a first network edge cloud instance, wherein the first edge device is proximate to a core network device; determining, by the system, a first property of a second network edge cloud path that is different from a second property of the first network edge cloud path based on a second network edge cloud path metric for a second network edge cloud path; selecting, by the system, the second network edge cloud path based on the first property; and initiating, by the system, a change to the first network edge cloud path based on the second network edge cloud path. 13. The method of claim 12, wherein the determining the first property comprises determining a ranking of the second network edge cloud path based on the second network edge cloud path metric for the second network edge cloud path between the user device and the first edge device supporting the first network edge cloud instance. 14. The method of claim 12, wherein the determining the first property comprises determining a ranking of the second network edge cloud path based on the second network edge cloud path metric for the second network edge cloud path between the user device and a second edge device supporting a second network edge cloud instance. 15. The method of claim 14, wherein the first network edge cloud instance facilitates use of a first application, and wherein the second network edge cloud instance facilitates use of a second application that is a same application as the first application. 16. The method of claim 12, wherein the initiating the change to the first network edge cloud path based on the second network edge cloud path results in establishing a connection between the user device and a second network edge cloud instance executing on a second edge device that is proximate to a second core network device and is also located remotely from the first edge device. 17. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising: determining a first performance of at least a portion of a first network edge cloud path between a user device and a first edge device supporting a first network edge cloud instance, wherein the first edge device is proximate to a core network device, and wherein the processor is comprised in the core network device; in response to determining a difference between a first performance of the first network edge cloud path and a second performance of at least a portion of a second network edge cloud path, selecting the second network edge cloud path based on the difference; and causing an adaptation of the first network edge cloud path based on the second network edge cloud path. 18. The machine-readable storage medium of claim 17, wherein the second network edge cloud path is between the user equipment and the first edge device supporting the first network edge cloud instance. 19. The machine-readable storage medium of claim 17, wherein the second network edge cloud path is between the user equipment and a second edge device supporting a second network edge cloud instance. 20. The machine-readable storage medium of claim 19, wherein the second edge device is located remotely from the first edge device.
2,400
344,415
16,803,910
2,471
Converting text-based requirements to a live prototype includes receiving text with a natural language string. The text includes a term for a component from a design language system and the natural language string describes at least a part of an interface. The method further includes generating, by a converter module, an output string from the text by: tokenizing the text to form a plurality of tokens that include a token for the term, tagging the token with a tag for the term, and applying a rule that uses the token and the tag. Applying the rule maps the token to the component of the design language system and writes the component into the output string. The method further includes generating the interface from the output string. The interface is made with the design language system and includes the component from the output string. The interface is presented with the component to a device.
1. A method comprising: receiving text with a natural language string, the text including a term for a component from a design language system, wherein the natural language string describes at least a part of an interface; generating, by a converter module, an output string from the text by: tokenizing the text to form a plurality of tokens, the plurality of tokens comprising a token for the term, tagging the token with a tag for the term, and applying a rule, of a set of rules, that uses the token and the tag to: map the token to the component of the design language system, and write the component in the output string; generating the interface from the output string, the interface made with the design language system, the interface including the component in the output string; and presenting the interface with the component to a device. 2. The method of claim 1, further comprising: tokenizing the text by mapping the plurality of tokens to words from the text. 3. The method of claim 1, further comprising: tagging the plurality of tokens by matching the plurality of tokens to a plurality of entity tags from a custom dictionary that identifies a plurality of components for the design language system with the entity tags. 4. The method of claim 1, further comprising: tagging, with the converter module, the plurality of tokens with a plurality parts of speech tags that identify parts of speech of the plurality of tokens. 5. The method of claim 1, further comprising: tagging, with the converter module, the plurality of tokens with a plurality of dependency tags to identify natural language dependencies between the tokens of the plurality of tokens. 6. The method of claim 1, further comprising: applying the set of rules to the plurality of tokens, a plurality of entity tags of the text tokens, a plurality of parts of speech tags of the text tokens, and a plurality of dependency tags of the text tokens to map the token to the component. 7. The method of claim 1, further comprising: identifying the component for the term by applying a fuzzy string matching algorithm to the term to identify a set of components from the design language system. 8. The method of claim 1, further comprising: applying the rule to the token and the tag, wherein the tag is a dependency tag that identifies the token as an object of a prepositional phrase. 9. The method of claim 1, further comprising: applying the rule to the token and the tag, wherein the tag is a parts of speech tag that identifies the token as a noun. 10. The method of claim 1, further comprising: presenting a design interface that includes a field into which the text is entered; and presenting the interface in response to receiving the text. 11. The method of claim 1, further comprising: generating the interface as a website with a uniform resource locator that includes a query identifying the interface. 12. The method of claim 1, further comprising: receiving the text as an input string formatted according to a data interchange format that uses human-readable text to transmit data objects with attribute-value pairs and array data types. 13. The method of claim 1, further comprising: generating the output string formatted according to a data interchange format that uses human-readable text to transmit data objects with attribute-value pairs and array data types. 14. The method of claim 1, wherein the text and the output string are formatted according to the JavaScript object notation (JSON) standard. 15. A system comprising: a memory coupled to a processor; an application that executes on the processor, uses the memory, and is configured for: receiving text with a natural language string including a term for a component from a design language system, wherein the natural language string is part of a natural language description of an interface that uses the design language system; generating, by a converter module, an output string from the text by: tokenizing the text to form a plurality of tokens, the plurality of tokens comprising a token for the term, tagging the token with a tag for the term, and applying a rule, of a set of rules, that uses the token and the tag to: map the token to the component of the design language system, and write the component in the output string; generating the interface from the output string, the interface made with the design language system, the interface including the component in the output string; and presenting the interface with the component to a user device. 16. The system of claim 11, wherein the application is further configured for: tokenizing the text by mapping the plurality of tokens to words from the text. 17. The system of claim 11, wherein the application is further configured for: tagging the plurality of tokens by matching the plurality of tokens to a plurality of entity tags from a custom dictionary that identifies a plurality of components for the design language system with the entity tags. 18. The system of claim 11, wherein the application is further configured for: tagging, with the converter module, the plurality of tokens with a plurality parts of speech tags that identify parts of speech of the plurality of tokens. 19. The system of claim 11, wherein the application is further configured for: tagging, with the converter module, the plurality of tokens with a plurality of dependency tags to identify natural language dependencies between the tokens of the plurality of tokens. 20. A non-transitory computer readable medium comprising computer readable program code for: receiving text with a natural language string including a term for a component from a design language system, wherein the natural language string is part of a natural language description of an interface that uses the design language system; generating, by a converter module, an output string from the text by: tokenizing the text to form a plurality of tokens, the plurality of tokens comprising a token for the term, tagging the token with a tag for the term, and applying a rule, of a set of rules, that uses the token and the tag to: map the token to the component of the design language system, and write the component in the output string; generating the interface from the output string, the interface made with the design language system, the interface including the component in the output string; and presenting the interface with the component to a user device.
Converting text-based requirements to a live prototype includes receiving text with a natural language string. The text includes a term for a component from a design language system and the natural language string describes at least a part of an interface. The method further includes generating, by a converter module, an output string from the text by: tokenizing the text to form a plurality of tokens that include a token for the term, tagging the token with a tag for the term, and applying a rule that uses the token and the tag. Applying the rule maps the token to the component of the design language system and writes the component into the output string. The method further includes generating the interface from the output string. The interface is made with the design language system and includes the component from the output string. The interface is presented with the component to a device.1. A method comprising: receiving text with a natural language string, the text including a term for a component from a design language system, wherein the natural language string describes at least a part of an interface; generating, by a converter module, an output string from the text by: tokenizing the text to form a plurality of tokens, the plurality of tokens comprising a token for the term, tagging the token with a tag for the term, and applying a rule, of a set of rules, that uses the token and the tag to: map the token to the component of the design language system, and write the component in the output string; generating the interface from the output string, the interface made with the design language system, the interface including the component in the output string; and presenting the interface with the component to a device. 2. The method of claim 1, further comprising: tokenizing the text by mapping the plurality of tokens to words from the text. 3. The method of claim 1, further comprising: tagging the plurality of tokens by matching the plurality of tokens to a plurality of entity tags from a custom dictionary that identifies a plurality of components for the design language system with the entity tags. 4. The method of claim 1, further comprising: tagging, with the converter module, the plurality of tokens with a plurality parts of speech tags that identify parts of speech of the plurality of tokens. 5. The method of claim 1, further comprising: tagging, with the converter module, the plurality of tokens with a plurality of dependency tags to identify natural language dependencies between the tokens of the plurality of tokens. 6. The method of claim 1, further comprising: applying the set of rules to the plurality of tokens, a plurality of entity tags of the text tokens, a plurality of parts of speech tags of the text tokens, and a plurality of dependency tags of the text tokens to map the token to the component. 7. The method of claim 1, further comprising: identifying the component for the term by applying a fuzzy string matching algorithm to the term to identify a set of components from the design language system. 8. The method of claim 1, further comprising: applying the rule to the token and the tag, wherein the tag is a dependency tag that identifies the token as an object of a prepositional phrase. 9. The method of claim 1, further comprising: applying the rule to the token and the tag, wherein the tag is a parts of speech tag that identifies the token as a noun. 10. The method of claim 1, further comprising: presenting a design interface that includes a field into which the text is entered; and presenting the interface in response to receiving the text. 11. The method of claim 1, further comprising: generating the interface as a website with a uniform resource locator that includes a query identifying the interface. 12. The method of claim 1, further comprising: receiving the text as an input string formatted according to a data interchange format that uses human-readable text to transmit data objects with attribute-value pairs and array data types. 13. The method of claim 1, further comprising: generating the output string formatted according to a data interchange format that uses human-readable text to transmit data objects with attribute-value pairs and array data types. 14. The method of claim 1, wherein the text and the output string are formatted according to the JavaScript object notation (JSON) standard. 15. A system comprising: a memory coupled to a processor; an application that executes on the processor, uses the memory, and is configured for: receiving text with a natural language string including a term for a component from a design language system, wherein the natural language string is part of a natural language description of an interface that uses the design language system; generating, by a converter module, an output string from the text by: tokenizing the text to form a plurality of tokens, the plurality of tokens comprising a token for the term, tagging the token with a tag for the term, and applying a rule, of a set of rules, that uses the token and the tag to: map the token to the component of the design language system, and write the component in the output string; generating the interface from the output string, the interface made with the design language system, the interface including the component in the output string; and presenting the interface with the component to a user device. 16. The system of claim 11, wherein the application is further configured for: tokenizing the text by mapping the plurality of tokens to words from the text. 17. The system of claim 11, wherein the application is further configured for: tagging the plurality of tokens by matching the plurality of tokens to a plurality of entity tags from a custom dictionary that identifies a plurality of components for the design language system with the entity tags. 18. The system of claim 11, wherein the application is further configured for: tagging, with the converter module, the plurality of tokens with a plurality parts of speech tags that identify parts of speech of the plurality of tokens. 19. The system of claim 11, wherein the application is further configured for: tagging, with the converter module, the plurality of tokens with a plurality of dependency tags to identify natural language dependencies between the tokens of the plurality of tokens. 20. A non-transitory computer readable medium comprising computer readable program code for: receiving text with a natural language string including a term for a component from a design language system, wherein the natural language string is part of a natural language description of an interface that uses the design language system; generating, by a converter module, an output string from the text by: tokenizing the text to form a plurality of tokens, the plurality of tokens comprising a token for the term, tagging the token with a tag for the term, and applying a rule, of a set of rules, that uses the token and the tag to: map the token to the component of the design language system, and write the component in the output string; generating the interface from the output string, the interface made with the design language system, the interface including the component in the output string; and presenting the interface with the component to a user device.
2,400
344,416
16,803,903
2,471
The hi-hat attachment includes an upper unit, a lower unit, and an operation lever. The lower unit includes a regulation unit that regulates the maximum fall position of the lower unit. The regulation unit is configured to adjust the maximum fall position of the lower unit.
1. A hi-hat attachment for attaching a hi-hat to a hi-hat stand, the hi-hat including a top cymbal, and a bottom cymbal, the hi-hat stand including a pedal operated during a performance of the hi-hat, and a rod that moves up and down by a depression of the pedal, the hi-hat attachment comprising: a fixed portion configured to be fixed to the rod; a cymbal holding portion configured to be slidably supported on the rod, the cymbal holding portion being configured to hold the top cymbal below the fixed portion; and an operation lever provided on one of the fixed portion and the cymbal holding portion, the operation lever being configured to be engageable with the other of the fixed portion and the cymbal holding portion, wherein while the cymbal holding portion is disposed at an initial position and the hi-hat is in an open state when the operation lever and the fixed portion or the cymbal holding portion are engaged, the cymbal holding portion falls when an engagement between the operation lever and the fixed portion or the cymbal holding portion is released, and the hi-hat attachment further comprising: a regulation unit configured to regulate a maximum fall position of the cymbal holding portion. 2. The hi-hat attachment according to claim 1, wherein the regulation unit is configured to adjust a maximum fall position of the cymbal holding portion. 3. The hi-hat attachment according to claim 2, wherein the regulation unit includes a screw mechanism, and the regulation unit is configured to adjust a maximum fall position of the cymbal holding portion by the screw mechanism. 4. The hi-hat attachment according to claim 1, wherein the regulation unit is provided on one of the fixed portion and the cymbal holding portion, and the regulation unit is configured to regulate a maximum fall position of the cymbal holding portion by bringing one of the fixed portion and the cymbal holding portion into contact with the other of the fixed portion and the cymbal holding portion. 5. The hi-hat attachment according to claim 4, wherein the regulation unit includes a connection portion that connects the fixed portion and the cymbal holding portion. 6. The hi-hat attachment according to claim 5, wherein the connection portion has an axis parallel to an axis of the rod, and the axis of the connection portion is laterally shifted from the axis of the rod. 7. The hi-hat attachment according to claim 5, wherein the connection portion is formed of a connection bolt screwed to the cymbal holding portion, and the connection portion is configured to regulate a maximum fall position of the cymbal holding portion by bringing a head of the connection bolt into contact with the fixed portion, and adjust the maximum fall position of the cymbal holding portion by adjusting an amount of screwing of the connection bolt. 8. The hi-hat attachment according to claim 7, wherein the connection bolt has a smooth outer peripheral surface between a portion screwed to the cymbal holding portion and the head. 9. The hi-hat attachment according to claim 1, wherein the regulation unit further includes a spring disposed between the cymbal holding portion and the fixed portion, and the spring is configured to bias the cymbal holding portion toward the top cymbal. 10. A hi-hat attachment for attaching a hi-hat to a hi-hat stand, the hi-hat including a top cymbal, and a bottom cymbal, the hi-hat stand including a pedal operated during a performance of the hi-hat, and a rod that moves up and down by a depression of the pedal, the hi-hat attachment comprising: a fixed portion configured to be fixed to the rod; a cymbal holding portion configured to be slidably supported on the rod, the cymbal holding portion being configured to hold the top cymbal below the fixed portion; and an operation lever provided on one of the fixed portion and the cymbal holding portion, the operation lever being configured to be engageable with the other of the fixed portion and the cymbal holding portion, wherein while the cymbal holding portion is disposed at an initial position and the hi-hat is in an open state when the operation lever and the fixed portion or the cymbal holding portion are engaged, the cymbal holding portion falls when the engagement between the operation lever and the fixed portion or the cymbal holding portion is released, the operation lever has a hitting surface that is hit by a tool for releasing an engagement with the fixed portion or the cymbal holding portion, and the hitting surface extends downward away from a horizontal line orthogonal to an axis of the rod as the hitting surface is away from the axis of the rod. 11. The hi-hat attachment according to claim 10, wherein the operation lever includes a lever proximal end near the axis of the rod, and a lever distal end away from the axis of the rod, and the lever distal end has a projection projecting upward from the hitting surface.
The hi-hat attachment includes an upper unit, a lower unit, and an operation lever. The lower unit includes a regulation unit that regulates the maximum fall position of the lower unit. The regulation unit is configured to adjust the maximum fall position of the lower unit.1. A hi-hat attachment for attaching a hi-hat to a hi-hat stand, the hi-hat including a top cymbal, and a bottom cymbal, the hi-hat stand including a pedal operated during a performance of the hi-hat, and a rod that moves up and down by a depression of the pedal, the hi-hat attachment comprising: a fixed portion configured to be fixed to the rod; a cymbal holding portion configured to be slidably supported on the rod, the cymbal holding portion being configured to hold the top cymbal below the fixed portion; and an operation lever provided on one of the fixed portion and the cymbal holding portion, the operation lever being configured to be engageable with the other of the fixed portion and the cymbal holding portion, wherein while the cymbal holding portion is disposed at an initial position and the hi-hat is in an open state when the operation lever and the fixed portion or the cymbal holding portion are engaged, the cymbal holding portion falls when an engagement between the operation lever and the fixed portion or the cymbal holding portion is released, and the hi-hat attachment further comprising: a regulation unit configured to regulate a maximum fall position of the cymbal holding portion. 2. The hi-hat attachment according to claim 1, wherein the regulation unit is configured to adjust a maximum fall position of the cymbal holding portion. 3. The hi-hat attachment according to claim 2, wherein the regulation unit includes a screw mechanism, and the regulation unit is configured to adjust a maximum fall position of the cymbal holding portion by the screw mechanism. 4. The hi-hat attachment according to claim 1, wherein the regulation unit is provided on one of the fixed portion and the cymbal holding portion, and the regulation unit is configured to regulate a maximum fall position of the cymbal holding portion by bringing one of the fixed portion and the cymbal holding portion into contact with the other of the fixed portion and the cymbal holding portion. 5. The hi-hat attachment according to claim 4, wherein the regulation unit includes a connection portion that connects the fixed portion and the cymbal holding portion. 6. The hi-hat attachment according to claim 5, wherein the connection portion has an axis parallel to an axis of the rod, and the axis of the connection portion is laterally shifted from the axis of the rod. 7. The hi-hat attachment according to claim 5, wherein the connection portion is formed of a connection bolt screwed to the cymbal holding portion, and the connection portion is configured to regulate a maximum fall position of the cymbal holding portion by bringing a head of the connection bolt into contact with the fixed portion, and adjust the maximum fall position of the cymbal holding portion by adjusting an amount of screwing of the connection bolt. 8. The hi-hat attachment according to claim 7, wherein the connection bolt has a smooth outer peripheral surface between a portion screwed to the cymbal holding portion and the head. 9. The hi-hat attachment according to claim 1, wherein the regulation unit further includes a spring disposed between the cymbal holding portion and the fixed portion, and the spring is configured to bias the cymbal holding portion toward the top cymbal. 10. A hi-hat attachment for attaching a hi-hat to a hi-hat stand, the hi-hat including a top cymbal, and a bottom cymbal, the hi-hat stand including a pedal operated during a performance of the hi-hat, and a rod that moves up and down by a depression of the pedal, the hi-hat attachment comprising: a fixed portion configured to be fixed to the rod; a cymbal holding portion configured to be slidably supported on the rod, the cymbal holding portion being configured to hold the top cymbal below the fixed portion; and an operation lever provided on one of the fixed portion and the cymbal holding portion, the operation lever being configured to be engageable with the other of the fixed portion and the cymbal holding portion, wherein while the cymbal holding portion is disposed at an initial position and the hi-hat is in an open state when the operation lever and the fixed portion or the cymbal holding portion are engaged, the cymbal holding portion falls when the engagement between the operation lever and the fixed portion or the cymbal holding portion is released, the operation lever has a hitting surface that is hit by a tool for releasing an engagement with the fixed portion or the cymbal holding portion, and the hitting surface extends downward away from a horizontal line orthogonal to an axis of the rod as the hitting surface is away from the axis of the rod. 11. The hi-hat attachment according to claim 10, wherein the operation lever includes a lever proximal end near the axis of the rod, and a lever distal end away from the axis of the rod, and the lever distal end has a projection projecting upward from the hitting surface.
2,400
344,417
16,803,896
2,471
Embodiments extend using sparse Merkle trees for smart synchronization of S3 buckets by overcoming fixed size limitations through creating another Merkle tree when the fixed size limit of the first tree is exceeded, and creating yet another tree when the second tree is filled up, and so on as needed. The method maintains a list of trees, in which each tree can be synchronized separately by keeping a strict division to trees according to generation number. The generation is passed from a source site to a target site during replication operations. The tagging of the generation number also makes it easy and efficient to remove an older version of an element or deal with deleted elements. This allows efficient syncing between two data object buckets without a size limitation on number of elements in a bucket.
1. A method of synchronizing object data between a source site and a target site, comprising: creating, in each of the source and target sites, an initial Merkle tree having a fixed size with each node having a hashed value of the metadata for the node and that of any children of that node; receiving data to be stored in the initial Merkle tree until the fixed size is reached; creating, upon reaching the fixed size, additional Merkle trees each of a respective fixed size in a sequence of successive additional Merkle trees as each additional Merkle tree receives data in excess of its respective fixed size; associating a unique generation number with each of the initial Merkle tree and additional Merkle trees, as maintained in an index table; determining, from the index table the existence of any missing additional Merkle trees that are in the source site but not in the target site; and copying data of the missing additional Merkle trees from the source site to the target site using a Merkle tree synchronization process. 2. The method of claim 1 wherein the object data comprises Amazon Simple Storage Service (S3) data. 3. The method of claim 1 wherein the Merkle tree is a sparse Merkle tree wherein a hash of an empty node is defined as zero, and includes nodes within the Merkle tree. 4. The method of claim 2 wherein the fixed size of the initial Merkle tree is of size M=c*n, wherein n is a maximum allowed number of elements in the bucket, and c is a single-digit integer constant. 5. The method of claim 4 wherein a size of each subsequent Merkle tree is the same size of the initial Merkle tree. 6. The method of claim 5 wherein a size of each subsequent Merkle tree increases relative to the size of the initial Merkle tree according to a defined sizing policy, and wherein the defined sizing policy comprises one of: increasing a subsequent Merkle tree size by a constant multiplier, or doubling a size of each subsequent Merkle tree or group of Merkle trees after the initial Merkle tree. 7. The method of claim 1 wherein the Merkle tree synchronization process comprises: recursively scanning child nodes of the missing additional Merkle trees to identify data blocks that have different hashes; and sending data corresponding to the different hashes from the source node to the target node. 8. The method of claim 2 wherein the unique generation number is stored as object metadata for each S3 data object. 9. The method of claim 8 wherein a new object of the received data is created in a POST operation by entering an element key and hash of the object value to a current Merkle tree, an existing data object is updated in a PUT operation by deleting its previous version from a previous Merkle tree in which the previous version resides, and an existing data object is deleted in a DELETE operation by fetching a corresponding generation tag for the existing data object and deleting it from the corresponding Merkle tree. 10. The method of claim 10 further comprising: receiving, in the target site, replicated data from the source sending the replicated data with an associated generation tag and object metadata to an appropriate Merkle tree on the target site if the replicated data object is already tagged; creating a new Merkle tree of the sequence of successive additional Merkle trees if the data object is not already tagged; and associating a new generation tag for the new Merkle tree. 11. A method of synchronizing object stores in a data backup system, comprising: maintaining a sequence of fixed-size Merkle trees for a source site and a target site; receiving data to be replicated from the source site to the target site; storing the received data in a current Merkle tree of the sequence of Merkle trees; creating new Merkle trees as the received data exceeds the fixed size of the current Merkle tree, wherein each new Merkle tree is assigned a unique generation number; and linking the unique generation number of each new Merkle tree to the corresponding new Merkle tree in an index table. 12. The method of claim 11 wherein the object data comprises Amazon Simple Storage Service (S3) data. 13. The method of claim 12 wherein the Merkle tree is a sparse Merkle tree wherein a hash of an empty node is defined as zero, and includes nodes within the Merkle tree. 14. The method of claim 13 wherein a size of each subsequent Merkle tree is the same size of the initial Merkle tree. 15. The method of claim 14 wherein a size of each subsequent Merkle tree increases relative to the size of the initial Merkle tree according to a defined sizing policy, and wherein the defined sizing policy comprises one of: increasing a subsequent Merkle tree size by a constant multiplier, or doubling a size of each subsequent Merkle tree or group of Merkle trees after the initial Merkle tree. 16. The method of claim 15 wherein the unique generation number is stored as object metadata for each S3 data object. 17. The method of claim 16 wherein a new object of the received data is created in a POST operation by entering an element key and hash of the object value to a current Merkle tree, an existing data object is updated in a PUT operation by deleting its previous version from a previous Merkle tree in which the previous version resides, and an existing data object is deleted in a DELETE operation by fetching a corresponding generation tag for the existing data object and deleting it from the corresponding Merkle tree. 18. The method of claim 11 wherein an initial Merkle tree of the sequence of fixed-size Merkle trees is denoted as Generation 1, a second Merkle tree of the sequence of fixed-size Merkle trees is denoted as Generation 2, a third Merkle tree of the sequence of fixed-size Merkle trees is denoted as Generation 3, and a fourth Merkle tree of the sequence of fixed-size Merkle trees is denoted as Generation 4. 19. The method of claim 18 wherein newly received data is input to a latest generation Merkle tree of the sequence of fixed-size Merkle trees. 20. A computer program product, comprising a non-transitory computer-readable medium having a computer-readable program code embodied therein, the computer-readable program code adapted to execute a method of synchronizing object stores in a data backup system, comprising: maintaining a sequence of fixed-size Merkle trees for a source site and a target site; receiving data to be replicated from the source site to the target site; storing the received data in a current Merkle tree of the sequence of Merkle trees; creating new Merkle trees as the received data exceeds the fixed size of the current Merkle tree, wherein each new Merkle tree is assigned a unique generation number; and linking the unique generation number of each new Merkle tree to the corresponding new Merkle tree in an index table.
Embodiments extend using sparse Merkle trees for smart synchronization of S3 buckets by overcoming fixed size limitations through creating another Merkle tree when the fixed size limit of the first tree is exceeded, and creating yet another tree when the second tree is filled up, and so on as needed. The method maintains a list of trees, in which each tree can be synchronized separately by keeping a strict division to trees according to generation number. The generation is passed from a source site to a target site during replication operations. The tagging of the generation number also makes it easy and efficient to remove an older version of an element or deal with deleted elements. This allows efficient syncing between two data object buckets without a size limitation on number of elements in a bucket.1. A method of synchronizing object data between a source site and a target site, comprising: creating, in each of the source and target sites, an initial Merkle tree having a fixed size with each node having a hashed value of the metadata for the node and that of any children of that node; receiving data to be stored in the initial Merkle tree until the fixed size is reached; creating, upon reaching the fixed size, additional Merkle trees each of a respective fixed size in a sequence of successive additional Merkle trees as each additional Merkle tree receives data in excess of its respective fixed size; associating a unique generation number with each of the initial Merkle tree and additional Merkle trees, as maintained in an index table; determining, from the index table the existence of any missing additional Merkle trees that are in the source site but not in the target site; and copying data of the missing additional Merkle trees from the source site to the target site using a Merkle tree synchronization process. 2. The method of claim 1 wherein the object data comprises Amazon Simple Storage Service (S3) data. 3. The method of claim 1 wherein the Merkle tree is a sparse Merkle tree wherein a hash of an empty node is defined as zero, and includes nodes within the Merkle tree. 4. The method of claim 2 wherein the fixed size of the initial Merkle tree is of size M=c*n, wherein n is a maximum allowed number of elements in the bucket, and c is a single-digit integer constant. 5. The method of claim 4 wherein a size of each subsequent Merkle tree is the same size of the initial Merkle tree. 6. The method of claim 5 wherein a size of each subsequent Merkle tree increases relative to the size of the initial Merkle tree according to a defined sizing policy, and wherein the defined sizing policy comprises one of: increasing a subsequent Merkle tree size by a constant multiplier, or doubling a size of each subsequent Merkle tree or group of Merkle trees after the initial Merkle tree. 7. The method of claim 1 wherein the Merkle tree synchronization process comprises: recursively scanning child nodes of the missing additional Merkle trees to identify data blocks that have different hashes; and sending data corresponding to the different hashes from the source node to the target node. 8. The method of claim 2 wherein the unique generation number is stored as object metadata for each S3 data object. 9. The method of claim 8 wherein a new object of the received data is created in a POST operation by entering an element key and hash of the object value to a current Merkle tree, an existing data object is updated in a PUT operation by deleting its previous version from a previous Merkle tree in which the previous version resides, and an existing data object is deleted in a DELETE operation by fetching a corresponding generation tag for the existing data object and deleting it from the corresponding Merkle tree. 10. The method of claim 10 further comprising: receiving, in the target site, replicated data from the source sending the replicated data with an associated generation tag and object metadata to an appropriate Merkle tree on the target site if the replicated data object is already tagged; creating a new Merkle tree of the sequence of successive additional Merkle trees if the data object is not already tagged; and associating a new generation tag for the new Merkle tree. 11. A method of synchronizing object stores in a data backup system, comprising: maintaining a sequence of fixed-size Merkle trees for a source site and a target site; receiving data to be replicated from the source site to the target site; storing the received data in a current Merkle tree of the sequence of Merkle trees; creating new Merkle trees as the received data exceeds the fixed size of the current Merkle tree, wherein each new Merkle tree is assigned a unique generation number; and linking the unique generation number of each new Merkle tree to the corresponding new Merkle tree in an index table. 12. The method of claim 11 wherein the object data comprises Amazon Simple Storage Service (S3) data. 13. The method of claim 12 wherein the Merkle tree is a sparse Merkle tree wherein a hash of an empty node is defined as zero, and includes nodes within the Merkle tree. 14. The method of claim 13 wherein a size of each subsequent Merkle tree is the same size of the initial Merkle tree. 15. The method of claim 14 wherein a size of each subsequent Merkle tree increases relative to the size of the initial Merkle tree according to a defined sizing policy, and wherein the defined sizing policy comprises one of: increasing a subsequent Merkle tree size by a constant multiplier, or doubling a size of each subsequent Merkle tree or group of Merkle trees after the initial Merkle tree. 16. The method of claim 15 wherein the unique generation number is stored as object metadata for each S3 data object. 17. The method of claim 16 wherein a new object of the received data is created in a POST operation by entering an element key and hash of the object value to a current Merkle tree, an existing data object is updated in a PUT operation by deleting its previous version from a previous Merkle tree in which the previous version resides, and an existing data object is deleted in a DELETE operation by fetching a corresponding generation tag for the existing data object and deleting it from the corresponding Merkle tree. 18. The method of claim 11 wherein an initial Merkle tree of the sequence of fixed-size Merkle trees is denoted as Generation 1, a second Merkle tree of the sequence of fixed-size Merkle trees is denoted as Generation 2, a third Merkle tree of the sequence of fixed-size Merkle trees is denoted as Generation 3, and a fourth Merkle tree of the sequence of fixed-size Merkle trees is denoted as Generation 4. 19. The method of claim 18 wherein newly received data is input to a latest generation Merkle tree of the sequence of fixed-size Merkle trees. 20. A computer program product, comprising a non-transitory computer-readable medium having a computer-readable program code embodied therein, the computer-readable program code adapted to execute a method of synchronizing object stores in a data backup system, comprising: maintaining a sequence of fixed-size Merkle trees for a source site and a target site; receiving data to be replicated from the source site to the target site; storing the received data in a current Merkle tree of the sequence of Merkle trees; creating new Merkle trees as the received data exceeds the fixed size of the current Merkle tree, wherein each new Merkle tree is assigned a unique generation number; and linking the unique generation number of each new Merkle tree to the corresponding new Merkle tree in an index table.
2,400
344,418
16,803,897
2,471
This disclosure describes single-use test cartridges, cell analyzer apparatus, and methods for automatically performing microscopic cell analysis tasks, such as counting and analyzing blood cells in biological samples. A small measured quantity of a biological sample, such as whole blood, is placed in a mixing bowl on the disposable test cartridge after being inserted into the cell analyzer. The analayzer also deposits a known amount of diluent/stain in the mixing bowl and mixes it with the blood. The analyzer takes a measured amount of the mixture and dispenses in a sample cup on the cartridge in fluid communication with an imaging chamber. The geometry of the imaging chamber is chosen to maintain the uniformity of the mixture, and to prevent cells from crowding or clumping as it is transferred into the imaging chamber by the analyzer. Images of all of the cellular components within the imaging chamber are counted and analyzed to obtain a complete blood count.
1-69. (canceled) 70. A method for analyzing and counting the biological particles in a blood sample comprising: a. separating a known amount of the blood sample; b. diluting the known amount of blood sample with a known amount of diluent and/or stain; c. mixing the known amount of blood sample and known amount of diluent and/or stain to obtain a substantially uniform mixture of sample and diluent and/or stain; d. transferring a known amount of the mixture of sample and diluent and/or stain to an imaging chamber in a test cartridge having a geometry such that the biological particles do not crowd or overlap as they settle to the bottom of the imaging chamber, and from which one or more images can be captured that are at least statistically representative of the number and distribution of the biological particles in the blood sample; and e. counting and analyzing at least one type of biological particle in the captured images with an automated microscope adapted to receive a test cartridge with an imaging chamber and utilizing bright field and florescent imaging, and with image processing and pattern recognition software. 71. A method of claim 70 further comprising displaying the one or more digital images of the particles. 72. A method of claim 70 wherein the counting and analyzing includes counting all of the particles in the imaging chamber. 73. A method of claim 70 wherein the known amount of sample used in the mixing is from 1 uL to 50 uL and the amount of diluent and/or stain used in the mixing is from 10 uL to 500 uL. 74. A method of claim 70 wherein a ratio of diluent and/or stain to sample in the mixture of diluent and/or stain and sample is between 10:1 to 250:1. 75. A method of claim 70 wherein a rate of transferring of the mixture of diluent and/or stain and sample into the imaging chamber is such that the mixture remains substantially uniform. 76. A method of claim 70 wherein a rate of transferring of the mixture of diluent and/or stain and sample into the imaging chamber is about 2 uL per second. 77. A method of claim 70 wherein the mixing includes mixing the sample with diluent and stain and the known amount of sample is 0.1 μL to 10 μL and the known amount of diluent and stain is 10 μL to 500 μL. 78. A method of claim 70 wherein the mixing further includes mixing a cell sphering agent with the known amount of blood sample and known amount of diluent and/or stain. 79. A method of claim 70 wherein the transferring includes pulling the mixture into the imaging chamber by suction through a vacuum port in the test cartridge. 80. A method of claim 70 wherein the transferring includes introducing the mixture into a sample cup which is in fluidic communication with the imaging chamber. 81. A method of claim 70 wherein the mixing mixes the sample and diluent and/or stain to obtain a mixture having a ratio of diluent and/or stain to sample of at least 10 to 1. 82. A method for analyzing and counting in claim 70 wherein the transferring transfers a known amount of the mixture of sample and diluent and/or stain to an imaging chamber in a test cartridge having a geometry such that the biological particles do not crowd or overlap as they settle to the bottom of the imaging chamber. 83. A method for analyzing and counting in claim 70 wherein the separating, the diluting, the mixing, and the transferring are performed by a movable sampling probe mechanism. 84. A method of claim 70 wherein the automated microscope with image processing software counts all of the white cells. 85. A method of claim 70 wherein the automated microscope with image processing software counts of the red cells. 86. A method of claim 70 wherein the automated microscope with image processing software performs a complete blood count. 87. A method of claim 70 wherein a width and depth of the imaging chamber is uniform and a length-to-width ratio of the imaging chamber is greater than 2 to 1. 88. A method of claim 70 wherein a width and depth of the imaging chamber are uniform and a length-to-width ratio of the imaging chamber is about 400 to 1. 89. A method of claim 70 wherein a width of the imaging chamber is uniform and between 0.5 mm and 2.5 mm. 90. A method of claim 70 wherein a depth and width of the imaging chamber are uniform and the width is 10 to 200 um. 91. A method of claim 70 wherein a depth of the imaging chamber is uniform and a shape of the imaging chamber in planar view is serpentine. 92. A method of claim 91 wherein an outside turning radius of the serpentine imaging chamber is about twice an inside turning radius of the serpentine imaging chamber. 93. A method of claim 70 wherein a depth of the imaging chamber is uniform and a shape of the imaging chamber in planar view is serpentine and having a width of 1.25 mm, an inside turning radius of 1.25 mm, an outside turning radius of 2.5 mm, and a depth of 0.125 mm. 94. A method of claim 70 wherein a shape of the imaging chamber in planar view is helical. 95. A method of claim 70 wherein a shape of the imaging chamber in planar view is castellated.
This disclosure describes single-use test cartridges, cell analyzer apparatus, and methods for automatically performing microscopic cell analysis tasks, such as counting and analyzing blood cells in biological samples. A small measured quantity of a biological sample, such as whole blood, is placed in a mixing bowl on the disposable test cartridge after being inserted into the cell analyzer. The analayzer also deposits a known amount of diluent/stain in the mixing bowl and mixes it with the blood. The analyzer takes a measured amount of the mixture and dispenses in a sample cup on the cartridge in fluid communication with an imaging chamber. The geometry of the imaging chamber is chosen to maintain the uniformity of the mixture, and to prevent cells from crowding or clumping as it is transferred into the imaging chamber by the analyzer. Images of all of the cellular components within the imaging chamber are counted and analyzed to obtain a complete blood count.1-69. (canceled) 70. A method for analyzing and counting the biological particles in a blood sample comprising: a. separating a known amount of the blood sample; b. diluting the known amount of blood sample with a known amount of diluent and/or stain; c. mixing the known amount of blood sample and known amount of diluent and/or stain to obtain a substantially uniform mixture of sample and diluent and/or stain; d. transferring a known amount of the mixture of sample and diluent and/or stain to an imaging chamber in a test cartridge having a geometry such that the biological particles do not crowd or overlap as they settle to the bottom of the imaging chamber, and from which one or more images can be captured that are at least statistically representative of the number and distribution of the biological particles in the blood sample; and e. counting and analyzing at least one type of biological particle in the captured images with an automated microscope adapted to receive a test cartridge with an imaging chamber and utilizing bright field and florescent imaging, and with image processing and pattern recognition software. 71. A method of claim 70 further comprising displaying the one or more digital images of the particles. 72. A method of claim 70 wherein the counting and analyzing includes counting all of the particles in the imaging chamber. 73. A method of claim 70 wherein the known amount of sample used in the mixing is from 1 uL to 50 uL and the amount of diluent and/or stain used in the mixing is from 10 uL to 500 uL. 74. A method of claim 70 wherein a ratio of diluent and/or stain to sample in the mixture of diluent and/or stain and sample is between 10:1 to 250:1. 75. A method of claim 70 wherein a rate of transferring of the mixture of diluent and/or stain and sample into the imaging chamber is such that the mixture remains substantially uniform. 76. A method of claim 70 wherein a rate of transferring of the mixture of diluent and/or stain and sample into the imaging chamber is about 2 uL per second. 77. A method of claim 70 wherein the mixing includes mixing the sample with diluent and stain and the known amount of sample is 0.1 μL to 10 μL and the known amount of diluent and stain is 10 μL to 500 μL. 78. A method of claim 70 wherein the mixing further includes mixing a cell sphering agent with the known amount of blood sample and known amount of diluent and/or stain. 79. A method of claim 70 wherein the transferring includes pulling the mixture into the imaging chamber by suction through a vacuum port in the test cartridge. 80. A method of claim 70 wherein the transferring includes introducing the mixture into a sample cup which is in fluidic communication with the imaging chamber. 81. A method of claim 70 wherein the mixing mixes the sample and diluent and/or stain to obtain a mixture having a ratio of diluent and/or stain to sample of at least 10 to 1. 82. A method for analyzing and counting in claim 70 wherein the transferring transfers a known amount of the mixture of sample and diluent and/or stain to an imaging chamber in a test cartridge having a geometry such that the biological particles do not crowd or overlap as they settle to the bottom of the imaging chamber. 83. A method for analyzing and counting in claim 70 wherein the separating, the diluting, the mixing, and the transferring are performed by a movable sampling probe mechanism. 84. A method of claim 70 wherein the automated microscope with image processing software counts all of the white cells. 85. A method of claim 70 wherein the automated microscope with image processing software counts of the red cells. 86. A method of claim 70 wherein the automated microscope with image processing software performs a complete blood count. 87. A method of claim 70 wherein a width and depth of the imaging chamber is uniform and a length-to-width ratio of the imaging chamber is greater than 2 to 1. 88. A method of claim 70 wherein a width and depth of the imaging chamber are uniform and a length-to-width ratio of the imaging chamber is about 400 to 1. 89. A method of claim 70 wherein a width of the imaging chamber is uniform and between 0.5 mm and 2.5 mm. 90. A method of claim 70 wherein a depth and width of the imaging chamber are uniform and the width is 10 to 200 um. 91. A method of claim 70 wherein a depth of the imaging chamber is uniform and a shape of the imaging chamber in planar view is serpentine. 92. A method of claim 91 wherein an outside turning radius of the serpentine imaging chamber is about twice an inside turning radius of the serpentine imaging chamber. 93. A method of claim 70 wherein a depth of the imaging chamber is uniform and a shape of the imaging chamber in planar view is serpentine and having a width of 1.25 mm, an inside turning radius of 1.25 mm, an outside turning radius of 2.5 mm, and a depth of 0.125 mm. 94. A method of claim 70 wherein a shape of the imaging chamber in planar view is helical. 95. A method of claim 70 wherein a shape of the imaging chamber in planar view is castellated.
2,400
344,419
16,803,850
2,471
This electric switching device (2) comprises a first module (4), including a first support (42) on which a circuit breaker (44) is mounted, and at least one second module (6), including a second support (62) on which an electric component (64) is mounted that is able to be associated with the circuit breaker. In particular in order to facilitate the maintenance of this switching device, the latter includes guiding means (81 and 82) that are able to guide the first and second supports relative to one another between a disassembled configuration, in which at least one of the first and second modules is disengageable from the guiding means independently of the other, and an assembled configuration, in which the circuit breaker and the electric component are in a relative connection position and are able to be electrically connected to or disconnected from one another.
1. An electric switching device for a railway vehicle, comprising: a first module including a first support on which a circuit breaker is mounted, at least one second module including a second support, which is separate from the first support and on which an electric component is mounted that is able to be associated with the circuit breaker, and guiding means that are able to guide the first and second supports relative to one another between a disassembled configuration, in which at least one of the first and second modules is disengageable from the guiding means independently of the other, and an assembled configuration, in which the circuit breaker and the electric component are able to be connected to one another, wherein in the assembled configuration, the circuit breaker and the electric component are in a relative connection position and are able to be electrically connected or disconnected. 2. The device according to claim 1, wherein the guiding means are configured to guide in translation, along an axis, the first and second supports between their assembled configuration and their disassembled configuration. 3. The device according to claim 2, wherein the guiding means are arranged in the first and second supports, the guiding means comprising complementary shapes configured to guide in translation the first and second supports between their assembled configuration and their disassembled configuration. 4. The device according to claim 1, wherein the first and second supports include mechanical assembly means that are configured to reversibly assemble the first and second supports to one another in the assembled configuration. 5. The device according to claim 4, wherein the assembly means comprise a first part borne by the first support and a second part borne by the second support, the first and second parts cooperating by shape complementarity when the first and second supports are in the assembled configuration. 6. The device according to claim 5, wherein one of the first and second parts of the assembly means is a male element, wherein the other of the first and second parts of the assembly means is a female element, and wherein the male element penetrates the female element when the first and second supports go from the disassembled configuration to the assembled configuration. 7. The device according to claim 1, wherein the device includes fastening means configured to fasten the first and second supports reversibly to the guiding means when the first and second supports are in the assembled configuration. 8. The device according to claim 1, wherein the first support is a plate having a first face on which the circuit breaker is mounted and a second face, which is opposite the first face of the plate of the first support and on which a control member is mounted to control the circuit breaker, wherein the second support is a plate having a first face on which the electric component is mounted and a second face, which is opposite the first face of the plate of the second support and on which the control member is mounted to control the electric component, and wherein the first face of the plate of the first support and the first face of the plate of the second support face the same side when the first and second supports are in the assembled configuration. 9. The device according to claim 8, wherein the first face of the plate of the first support and the first face of the plate of the second support are flush when the first and second supports are in the assembled configuration. 10. The device according to claim 1, wherein the circuit breaker includes a first connection member, wherein the electric component includes a second connection member, and wherein the first and second connection members are able to be electrically connected to one another when the first and second supports are in the assembled configuration. 11. The device according to claim 8, wherein the circuit breaker includes a first connection member, wherein the electric component includes a second connection member, wherein the first and second connection members are able to be electrically connected to one another when the first and second supports are in the assembled configuration, and wherein the first and second connection members connect to one another under the action of at least one of the control members when the first and second supports are in the assembled configuration. 12. A railway vehicle, including: an aisle, a high-voltage box, accessible via the aisle, and an electric switching device,
This electric switching device (2) comprises a first module (4), including a first support (42) on which a circuit breaker (44) is mounted, and at least one second module (6), including a second support (62) on which an electric component (64) is mounted that is able to be associated with the circuit breaker. In particular in order to facilitate the maintenance of this switching device, the latter includes guiding means (81 and 82) that are able to guide the first and second supports relative to one another between a disassembled configuration, in which at least one of the first and second modules is disengageable from the guiding means independently of the other, and an assembled configuration, in which the circuit breaker and the electric component are in a relative connection position and are able to be electrically connected to or disconnected from one another.1. An electric switching device for a railway vehicle, comprising: a first module including a first support on which a circuit breaker is mounted, at least one second module including a second support, which is separate from the first support and on which an electric component is mounted that is able to be associated with the circuit breaker, and guiding means that are able to guide the first and second supports relative to one another between a disassembled configuration, in which at least one of the first and second modules is disengageable from the guiding means independently of the other, and an assembled configuration, in which the circuit breaker and the electric component are able to be connected to one another, wherein in the assembled configuration, the circuit breaker and the electric component are in a relative connection position and are able to be electrically connected or disconnected. 2. The device according to claim 1, wherein the guiding means are configured to guide in translation, along an axis, the first and second supports between their assembled configuration and their disassembled configuration. 3. The device according to claim 2, wherein the guiding means are arranged in the first and second supports, the guiding means comprising complementary shapes configured to guide in translation the first and second supports between their assembled configuration and their disassembled configuration. 4. The device according to claim 1, wherein the first and second supports include mechanical assembly means that are configured to reversibly assemble the first and second supports to one another in the assembled configuration. 5. The device according to claim 4, wherein the assembly means comprise a first part borne by the first support and a second part borne by the second support, the first and second parts cooperating by shape complementarity when the first and second supports are in the assembled configuration. 6. The device according to claim 5, wherein one of the first and second parts of the assembly means is a male element, wherein the other of the first and second parts of the assembly means is a female element, and wherein the male element penetrates the female element when the first and second supports go from the disassembled configuration to the assembled configuration. 7. The device according to claim 1, wherein the device includes fastening means configured to fasten the first and second supports reversibly to the guiding means when the first and second supports are in the assembled configuration. 8. The device according to claim 1, wherein the first support is a plate having a first face on which the circuit breaker is mounted and a second face, which is opposite the first face of the plate of the first support and on which a control member is mounted to control the circuit breaker, wherein the second support is a plate having a first face on which the electric component is mounted and a second face, which is opposite the first face of the plate of the second support and on which the control member is mounted to control the electric component, and wherein the first face of the plate of the first support and the first face of the plate of the second support face the same side when the first and second supports are in the assembled configuration. 9. The device according to claim 8, wherein the first face of the plate of the first support and the first face of the plate of the second support are flush when the first and second supports are in the assembled configuration. 10. The device according to claim 1, wherein the circuit breaker includes a first connection member, wherein the electric component includes a second connection member, and wherein the first and second connection members are able to be electrically connected to one another when the first and second supports are in the assembled configuration. 11. The device according to claim 8, wherein the circuit breaker includes a first connection member, wherein the electric component includes a second connection member, wherein the first and second connection members are able to be electrically connected to one another when the first and second supports are in the assembled configuration, and wherein the first and second connection members connect to one another under the action of at least one of the control members when the first and second supports are in the assembled configuration. 12. A railway vehicle, including: an aisle, a high-voltage box, accessible via the aisle, and an electric switching device,
2,400
344,420
16,803,908
2,842
A semiconductor device connectable between a first power-supply line connected to a power source and through which power is continuously supplied to a first circuit, and a second power-supply line that is not directly connected to the power source and is connected to a second circuit, includes a first switch connectable between the first and second power-supply lines and turned on in response to a signal for supplying power to the second circuit, a second switch connectable between the first and second power-supply lines and having a current supply capability higher than the first switch, and a control circuit configured to turn on the second switch when the first switch is turned on and a voltage applied to the second power-supply line has reached a threshold.
1. A semiconductor device connectable between a first power-supply line connected to a power source and through which power is continuously supplied to a first circuit, and a second power-supply line that is not directly connected to the power source and is connected to a second circuit, the semiconductor device comprising: a first switch connectable between the first and second power-supply lines and turned on in response to a signal for supplying power to the second circuit; a second switch connectable between the first and second power-supply lines and having a current supply capability higher than the first switch; and a control circuit configured to turn on the second switch when the first switch is turned on and a voltage applied to the second power-supply line has reached a threshold. 2. The semiconductor device according to claim 1, wherein the signal is input to the first switch after a first switch of another semiconductor device is turned on. 3. The semiconductor device according to claim 1, further comprising: a third switch connectable between the first and second power-supply lines and having a current supply capability higher than the second switch. 4. The semiconductor device according to claim 3, wherein the third switch is turned on after the second switch is turned on. 5. The semiconductor device according to claim 1, wherein the control circuit includes a NAND gate to which the signal and the voltage applied to the second power-supply line are input. 6. The semiconductor device according to claim 1, wherein the second circuit is a logic circuit including one of a central processing unit (CPU) , an error correction code circuit, an encryption circuit, and a circuit for a static random access memory (SRAM). 7. The semiconductor device according to claim 1, wherein the semiconductor device is a power switch cell (PSW). 8. A semiconductor device connectable between a first power-supply line connected to a power source and through which power is continuously supplied to a first circuit, and a second power-supply line that is not directly connected to the power source and is connected to a second circuit, the semiconductor device comprising: a first switch connectable between the first and second power-supply lines and turned on in response to a signal for supplying power to the second circuit; a current-limiting circuit connected to the first switch in series and configured to decrease current flowing therein as a voltage applied to the second power-supply line increases; a second switch connectable between the first and second power-supply lines and having a current supply capability equal to or lower than the first switch; and a control circuit configured to turn on the second switch when the first switch is turned on and the voltage applied to the second power-supply line has reached a threshold. 9. The semiconductor device according to claim 8, wherein the signal is input to the first switch after a first switch of another semiconductor device is turned on. 10. The semiconductor device according to claim 8, further comprising: a third switch connectable between the first and second power-supply lines and having a current supply capability higher than the first switch. 11. The semiconductor device according to claim 10, wherein the third switch is turned on after the second switch is turned on. 12. The semiconductor device according to claim 8, wherein the current-limiting circuit includes a diode having an anode connected to the second switch and a cathode connectable to the second power-supply line. 13. The semiconductor device according to claim 8, wherein the current-limiting circuit includes a p-channel MOSFET, a gate and one of main electrodes of the p-channel MOSFET are connectable to the second power-supply line, and the other main electrode is connected to the second switch. 14. The semiconductor device according to claim 8, wherein the control circuit includes a NAND gate to which the signal and the voltage applied to the second power-supply line are input. 15. The semiconductor device according to claim 8, wherein the second circuit is a logic circuit including one of a central processing unit (CPU), an error correction code circuit, an encryption circuit, and a circuit for a static random access memory (SRAM). 16. A semiconductor integrated circuit comprising: a first power-supply line connected to a power source and through which power is continuously supplied to a first circuit; a second power-supply line that is not directly connected to the power source and is connected to a second circuit; and a plurality of semiconductor devices each including a first switch connected between the first and second power-supply lines and turned on in response to a signal for supplying power to the second circuit, a second switch connected between the first and second power-supply lines and having a current supply capability higher than the first switch, and a control circuit configured to turn on the second switch when the first switch is turned on and a voltage applied to the second power-supply line has reached a threshold. 17. The semiconductor integrated circuit according to claim 16, wherein the semiconductor devices include a first group of one or more semiconductor devices and a second group of one or more semiconductor devices, and upon selection of one of the first and second groups, the signal is input to the first switch of one of the semiconductor devices in the selected group. 18. The semiconductor integrated circuit according to claim 17, further comprising: a shift register by which one of the first and second groups is selected. 19. The semiconductor integrated circuit according to claim 17, wherein after the first switch of said one of the semiconductor devices in the selected group is turned on, the first switch of another semiconductor device in the selected group is turned on. 20. The semiconductor integrated circuit according to claim 16, wherein each of the semiconductor devices includes a third switch connected between the first and second power-supply lines and having a current supply capability higher than the second switch.
A semiconductor device connectable between a first power-supply line connected to a power source and through which power is continuously supplied to a first circuit, and a second power-supply line that is not directly connected to the power source and is connected to a second circuit, includes a first switch connectable between the first and second power-supply lines and turned on in response to a signal for supplying power to the second circuit, a second switch connectable between the first and second power-supply lines and having a current supply capability higher than the first switch, and a control circuit configured to turn on the second switch when the first switch is turned on and a voltage applied to the second power-supply line has reached a threshold.1. A semiconductor device connectable between a first power-supply line connected to a power source and through which power is continuously supplied to a first circuit, and a second power-supply line that is not directly connected to the power source and is connected to a second circuit, the semiconductor device comprising: a first switch connectable between the first and second power-supply lines and turned on in response to a signal for supplying power to the second circuit; a second switch connectable between the first and second power-supply lines and having a current supply capability higher than the first switch; and a control circuit configured to turn on the second switch when the first switch is turned on and a voltage applied to the second power-supply line has reached a threshold. 2. The semiconductor device according to claim 1, wherein the signal is input to the first switch after a first switch of another semiconductor device is turned on. 3. The semiconductor device according to claim 1, further comprising: a third switch connectable between the first and second power-supply lines and having a current supply capability higher than the second switch. 4. The semiconductor device according to claim 3, wherein the third switch is turned on after the second switch is turned on. 5. The semiconductor device according to claim 1, wherein the control circuit includes a NAND gate to which the signal and the voltage applied to the second power-supply line are input. 6. The semiconductor device according to claim 1, wherein the second circuit is a logic circuit including one of a central processing unit (CPU) , an error correction code circuit, an encryption circuit, and a circuit for a static random access memory (SRAM). 7. The semiconductor device according to claim 1, wherein the semiconductor device is a power switch cell (PSW). 8. A semiconductor device connectable between a first power-supply line connected to a power source and through which power is continuously supplied to a first circuit, and a second power-supply line that is not directly connected to the power source and is connected to a second circuit, the semiconductor device comprising: a first switch connectable between the first and second power-supply lines and turned on in response to a signal for supplying power to the second circuit; a current-limiting circuit connected to the first switch in series and configured to decrease current flowing therein as a voltage applied to the second power-supply line increases; a second switch connectable between the first and second power-supply lines and having a current supply capability equal to or lower than the first switch; and a control circuit configured to turn on the second switch when the first switch is turned on and the voltage applied to the second power-supply line has reached a threshold. 9. The semiconductor device according to claim 8, wherein the signal is input to the first switch after a first switch of another semiconductor device is turned on. 10. The semiconductor device according to claim 8, further comprising: a third switch connectable between the first and second power-supply lines and having a current supply capability higher than the first switch. 11. The semiconductor device according to claim 10, wherein the third switch is turned on after the second switch is turned on. 12. The semiconductor device according to claim 8, wherein the current-limiting circuit includes a diode having an anode connected to the second switch and a cathode connectable to the second power-supply line. 13. The semiconductor device according to claim 8, wherein the current-limiting circuit includes a p-channel MOSFET, a gate and one of main electrodes of the p-channel MOSFET are connectable to the second power-supply line, and the other main electrode is connected to the second switch. 14. The semiconductor device according to claim 8, wherein the control circuit includes a NAND gate to which the signal and the voltage applied to the second power-supply line are input. 15. The semiconductor device according to claim 8, wherein the second circuit is a logic circuit including one of a central processing unit (CPU), an error correction code circuit, an encryption circuit, and a circuit for a static random access memory (SRAM). 16. A semiconductor integrated circuit comprising: a first power-supply line connected to a power source and through which power is continuously supplied to a first circuit; a second power-supply line that is not directly connected to the power source and is connected to a second circuit; and a plurality of semiconductor devices each including a first switch connected between the first and second power-supply lines and turned on in response to a signal for supplying power to the second circuit, a second switch connected between the first and second power-supply lines and having a current supply capability higher than the first switch, and a control circuit configured to turn on the second switch when the first switch is turned on and a voltage applied to the second power-supply line has reached a threshold. 17. The semiconductor integrated circuit according to claim 16, wherein the semiconductor devices include a first group of one or more semiconductor devices and a second group of one or more semiconductor devices, and upon selection of one of the first and second groups, the signal is input to the first switch of one of the semiconductor devices in the selected group. 18. The semiconductor integrated circuit according to claim 17, further comprising: a shift register by which one of the first and second groups is selected. 19. The semiconductor integrated circuit according to claim 17, wherein after the first switch of said one of the semiconductor devices in the selected group is turned on, the first switch of another semiconductor device in the selected group is turned on. 20. The semiconductor integrated circuit according to claim 16, wherein each of the semiconductor devices includes a third switch connected between the first and second power-supply lines and having a current supply capability higher than the second switch.
2,800
344,421
16,803,899
2,842
A coreflood experiment may be modeled by generating a three dimensional computer simulation model of a core plug and modeling within the three dimensional computer simulation model one or both of a fluid introduction element or a fluid extraction element of a core holder used in the coreflood experiment. Once generated, the model may be loaded and used when running a simulation to model a heterogeneous distribution of fluid flow proximate one or more faces of the core plug.
1. A method of modeling fluid flow through a core plug in a coreflood experiment, the method comprising: loading a three dimensional computer simulation model of a core plug that additionally models one or both of a fluid introduction element or a fluid extraction element of a core holder, wherein the three dimensional computer simulation model models the one or both of the fluid introduction element or the fluid extraction element of the core holder using a plurality of grid cells, and wherein the plurality of grid cells model at least one channel or port through which fluid flows in the one or both of the fluid introduction element or the fluid extraction element; and running a simulation using the three dimensional computer simulation model in a computer-implemented reservoir simulator to model heterogeneous distribution of fluid flow proximate one or more faces of the core plug. 2. The method of claim 1, wherein the computer-implemented reservoir simulator comprises a general purpose reservoir simulator. 3. The method of claim 1, wherein the one or both of the fluid introduction element or the fluid extraction element modeled in the three dimensional computer simulation model an end effect in the coreflood experiment, and wherein running the simulation includes modeling boundary conditions by representing the fluid introduction element as an injection well and representing the fluid extraction element as a production well. 4. The method of claim 1, wherein the core plug is homogeneous such that the three dimensional computer simulation model has a second plurality of grid cells having a same property and representing the core plug. 5. The method of claim 1, wherein the core plug is heterogeneous such that the three dimensional computer simulation model has a second plurality of grid cells with varying properties and representing the core plug. 6. The method of claim 1, wherein running the simulation using the three dimensional computer simulation includes modeling distribution and fingering of fluid flow proximate one or more faces of the core plug. 7. The method of claim 6, wherein running the simulation includes modeling pressure drop across the core plug. 8. The method of claim 1, further comprising: generating the three dimensional computer simulation model using a graphical pre/post-processor for a general purpose reservoir simulation; and displaying simulation results in three dimensions using the graphical pre/post-processor. 9. The method of claim 1, wherein the plurality of grid cells of the three dimensional computer simulation model models the fluid introduction element and the fluid extraction element. 10. The method of claim 1, wherein the plurality of grid cells of the three dimensional computer simulation model a plurality of ports in each of the fluid introduction element and the fluid extraction element. 11. The method of claim 10, wherein the plurality of grid cells of the three dimensional computer simulation model a plurality of channels in each of the fluid introduction element and the fluid extraction element. 12. The method of claim 11, wherein the plurality of grid cells of the three dimensional computer simulation model a plurality of circular channels. 13. The method of claim 11, wherein the plurality of grid cells of the three dimensional computer simulation model a plurality of radial channels. 14. The method of claim 1, wherein the three dimensional computer simulation model has a grid with a resolution that substantially matches that of a nuclear magnetic resonance scanner used to determine oil saturation in the core during the coreflood experiment. 15. The method of claim 1, wherein the one or both of the fluid introduction element or the fluid extraction element are symmetrical about one or more planes along an axis of symmetry of the core plug, and wherein the three dimensional computer simulation model models only a segment of the core plug and the one or both of the fluid introduction element or the fluid extraction element. 16. The method of claim 15, wherein the fluid introduction element and the fluid extraction element are each symmetrical about a single plane, and wherein generating the three dimensional computer simulation model and wherein the three dimensional computer simulation model models only a semi cylinder segment of the core plug and the one or both of the fluid introduction element or the fluid extraction element. 17. The method of claim 15, wherein the fluid introduction element and the fluid extraction element are each symmetrical about a first and second orthogonal planes, and wherein the three dimensional computer simulation model models only a quarter cylinder segment of the core plug and the one or both of the fluid introduction element or the fluid extraction element. 18. An apparatus, comprising: a memory, the memory storing a three dimensional computer simulation model of a core plug that additionally models one or both of a fluid introduction element or a fluid extraction element of a core holder, wherein the three dimensional computer simulation model models the one or both of the fluid introduction element or the fluid extraction element of the core holder using a plurality of grid cells, and wherein the plurality of grid cells model at least one channel or port through which fluid flows in the one or both of the fluid introduction element or the fluid extraction element; at least one processing unit; and program code configured upon execution by the at least one processing unit to run a simulation using the three dimensional computer simulation model in a computer-implemented reservoir simulator to model heterogeneous distribution of fluid flow proximate one or more faces of the core plug. 19. The apparatus of claim 18, further comprising program code configured upon execution by the at least one processing unit to generate the three dimensional computer simulation model and to model in the three dimensional computer simulation model the one or both of the fluid introduction element or the fluid extraction element of the core holder. 20. A program product, comprising: a non-transitory computer readable medium; and program code stored on the computer readable medium and configured upon execution by at least one processing unit to model fluid flow through a core plug in a coreflood experiment by: loading a three dimensional computer simulation model of a core plug that additionally models one or both of a fluid introduction element or a fluid extraction element of a core holder, wherein the three dimensional computer simulation model models the one or both of the fluid introduction element or the fluid extraction element of the core holder using a plurality of grid cells, and wherein the plurality of grid cells model at least one channel or port through which fluid flows in the one or both of the fluid introduction element or the fluid extraction element; and running a simulation using the three dimensional computer simulation model in a computer-implemented reservoir simulator to model heterogeneous distribution of fluid flow proximate one or more faces of the core plug.
A coreflood experiment may be modeled by generating a three dimensional computer simulation model of a core plug and modeling within the three dimensional computer simulation model one or both of a fluid introduction element or a fluid extraction element of a core holder used in the coreflood experiment. Once generated, the model may be loaded and used when running a simulation to model a heterogeneous distribution of fluid flow proximate one or more faces of the core plug.1. A method of modeling fluid flow through a core plug in a coreflood experiment, the method comprising: loading a three dimensional computer simulation model of a core plug that additionally models one or both of a fluid introduction element or a fluid extraction element of a core holder, wherein the three dimensional computer simulation model models the one or both of the fluid introduction element or the fluid extraction element of the core holder using a plurality of grid cells, and wherein the plurality of grid cells model at least one channel or port through which fluid flows in the one or both of the fluid introduction element or the fluid extraction element; and running a simulation using the three dimensional computer simulation model in a computer-implemented reservoir simulator to model heterogeneous distribution of fluid flow proximate one or more faces of the core plug. 2. The method of claim 1, wherein the computer-implemented reservoir simulator comprises a general purpose reservoir simulator. 3. The method of claim 1, wherein the one or both of the fluid introduction element or the fluid extraction element modeled in the three dimensional computer simulation model an end effect in the coreflood experiment, and wherein running the simulation includes modeling boundary conditions by representing the fluid introduction element as an injection well and representing the fluid extraction element as a production well. 4. The method of claim 1, wherein the core plug is homogeneous such that the three dimensional computer simulation model has a second plurality of grid cells having a same property and representing the core plug. 5. The method of claim 1, wherein the core plug is heterogeneous such that the three dimensional computer simulation model has a second plurality of grid cells with varying properties and representing the core plug. 6. The method of claim 1, wherein running the simulation using the three dimensional computer simulation includes modeling distribution and fingering of fluid flow proximate one or more faces of the core plug. 7. The method of claim 6, wherein running the simulation includes modeling pressure drop across the core plug. 8. The method of claim 1, further comprising: generating the three dimensional computer simulation model using a graphical pre/post-processor for a general purpose reservoir simulation; and displaying simulation results in three dimensions using the graphical pre/post-processor. 9. The method of claim 1, wherein the plurality of grid cells of the three dimensional computer simulation model models the fluid introduction element and the fluid extraction element. 10. The method of claim 1, wherein the plurality of grid cells of the three dimensional computer simulation model a plurality of ports in each of the fluid introduction element and the fluid extraction element. 11. The method of claim 10, wherein the plurality of grid cells of the three dimensional computer simulation model a plurality of channels in each of the fluid introduction element and the fluid extraction element. 12. The method of claim 11, wherein the plurality of grid cells of the three dimensional computer simulation model a plurality of circular channels. 13. The method of claim 11, wherein the plurality of grid cells of the three dimensional computer simulation model a plurality of radial channels. 14. The method of claim 1, wherein the three dimensional computer simulation model has a grid with a resolution that substantially matches that of a nuclear magnetic resonance scanner used to determine oil saturation in the core during the coreflood experiment. 15. The method of claim 1, wherein the one or both of the fluid introduction element or the fluid extraction element are symmetrical about one or more planes along an axis of symmetry of the core plug, and wherein the three dimensional computer simulation model models only a segment of the core plug and the one or both of the fluid introduction element or the fluid extraction element. 16. The method of claim 15, wherein the fluid introduction element and the fluid extraction element are each symmetrical about a single plane, and wherein generating the three dimensional computer simulation model and wherein the three dimensional computer simulation model models only a semi cylinder segment of the core plug and the one or both of the fluid introduction element or the fluid extraction element. 17. The method of claim 15, wherein the fluid introduction element and the fluid extraction element are each symmetrical about a first and second orthogonal planes, and wherein the three dimensional computer simulation model models only a quarter cylinder segment of the core plug and the one or both of the fluid introduction element or the fluid extraction element. 18. An apparatus, comprising: a memory, the memory storing a three dimensional computer simulation model of a core plug that additionally models one or both of a fluid introduction element or a fluid extraction element of a core holder, wherein the three dimensional computer simulation model models the one or both of the fluid introduction element or the fluid extraction element of the core holder using a plurality of grid cells, and wherein the plurality of grid cells model at least one channel or port through which fluid flows in the one or both of the fluid introduction element or the fluid extraction element; at least one processing unit; and program code configured upon execution by the at least one processing unit to run a simulation using the three dimensional computer simulation model in a computer-implemented reservoir simulator to model heterogeneous distribution of fluid flow proximate one or more faces of the core plug. 19. The apparatus of claim 18, further comprising program code configured upon execution by the at least one processing unit to generate the three dimensional computer simulation model and to model in the three dimensional computer simulation model the one or both of the fluid introduction element or the fluid extraction element of the core holder. 20. A program product, comprising: a non-transitory computer readable medium; and program code stored on the computer readable medium and configured upon execution by at least one processing unit to model fluid flow through a core plug in a coreflood experiment by: loading a three dimensional computer simulation model of a core plug that additionally models one or both of a fluid introduction element or a fluid extraction element of a core holder, wherein the three dimensional computer simulation model models the one or both of the fluid introduction element or the fluid extraction element of the core holder using a plurality of grid cells, and wherein the plurality of grid cells model at least one channel or port through which fluid flows in the one or both of the fluid introduction element or the fluid extraction element; and running a simulation using the three dimensional computer simulation model in a computer-implemented reservoir simulator to model heterogeneous distribution of fluid flow proximate one or more faces of the core plug.
2,800
344,422
16,803,911
2,872
A semi-finished ophthalmic lens for formation of a plurality of different finished ophthalmic lenses requiring reduced amounts of lens material to be removed for formation of the finished ophthalmic lenses and reduced rates of departure of a surfacing tool and methods of making same. Lens material is reduced by providing first and second surfaces that have different optical powers, the second optical surface having a second curve that approximates second optical surfaces of a plurality of finished ophthalmic lenses at coordinates at which lenses of the plurality of finished ophthalmic lenses have maximum thicknesses.
1.-20. (canceled) 21. A method of making a semi-finished lens comprising: determining the x, y, z coordinates of surfaces to be generated on the back of a semi-finished lens blank in order to produce a finished lens; determining a free-form curve for a front surface of said semi-finished lens blank based on said x, y, z coordinates; said free-form curve of said front surface minimizing a rate of departure of a sum of all said surfaces to be generated on the back of said semi-finished lens blank; and, molding said semi-finished lens blank to have said free-form front surface. 22. The method according to claim 21, wherein the determining of the x, y, z coordinates includes inputting the surface definition files of a finishing lab. 23. The method according to claim 21, further comprising cutting a back surface of said semi-finished lens to produce a finished lens. 24. The method according to claim 21, determining representative back surfaces desired to be formed on said semi-finished lens. 25. The method according to claim 24, determining an optimized back curve for said back surface based on said representative back surfaces; said optimized back curve approximating a maximum thickness to said semi-finished lens blank that minimizes the amount of bulk lens material to be removed for said representative back surfaces. 26. The method according to claim 25, further comprising forming said optimized back curve on said semi-finished lens blank. 27. The method according to claim 21, wherein said x, y, z coordinates are obtained from an optical lab. 28. The method according to claim 27, wherein a frequency of production of at least some of the surfaces defined by said x, y, z coordinates is obtained from said optical lab. 29. The method according to claim 28, further comprising forming an optimized back curve on said semi-finished lens based on said frequency of production of at least some of the surfaces.
A semi-finished ophthalmic lens for formation of a plurality of different finished ophthalmic lenses requiring reduced amounts of lens material to be removed for formation of the finished ophthalmic lenses and reduced rates of departure of a surfacing tool and methods of making same. Lens material is reduced by providing first and second surfaces that have different optical powers, the second optical surface having a second curve that approximates second optical surfaces of a plurality of finished ophthalmic lenses at coordinates at which lenses of the plurality of finished ophthalmic lenses have maximum thicknesses.1.-20. (canceled) 21. A method of making a semi-finished lens comprising: determining the x, y, z coordinates of surfaces to be generated on the back of a semi-finished lens blank in order to produce a finished lens; determining a free-form curve for a front surface of said semi-finished lens blank based on said x, y, z coordinates; said free-form curve of said front surface minimizing a rate of departure of a sum of all said surfaces to be generated on the back of said semi-finished lens blank; and, molding said semi-finished lens blank to have said free-form front surface. 22. The method according to claim 21, wherein the determining of the x, y, z coordinates includes inputting the surface definition files of a finishing lab. 23. The method according to claim 21, further comprising cutting a back surface of said semi-finished lens to produce a finished lens. 24. The method according to claim 21, determining representative back surfaces desired to be formed on said semi-finished lens. 25. The method according to claim 24, determining an optimized back curve for said back surface based on said representative back surfaces; said optimized back curve approximating a maximum thickness to said semi-finished lens blank that minimizes the amount of bulk lens material to be removed for said representative back surfaces. 26. The method according to claim 25, further comprising forming said optimized back curve on said semi-finished lens blank. 27. The method according to claim 21, wherein said x, y, z coordinates are obtained from an optical lab. 28. The method according to claim 27, wherein a frequency of production of at least some of the surfaces defined by said x, y, z coordinates is obtained from said optical lab. 29. The method according to claim 28, further comprising forming an optimized back curve on said semi-finished lens based on said frequency of production of at least some of the surfaces.
2,800
344,423
16,803,858
2,872
A voice-controlled electronic device that includes an axisymmetric device housing having a longitudinal axis bisecting opposing top and bottom surfaces and a side surface extending between the top and bottom surfaces. The device can further include a plurality of microphones disposed within the device housing and distributed radially around the longitudinal axis; a processor configured to execute computer instructions stored in a computer-readable memory for interacting with a user and processing voice commands received by the plurality of microphones and first and second transducers configured to generate sound waves within different frequency ranges.
1. A voice-controlled electronic device comprising: an axisymmetric device housing having a longitudinal axis bisecting opposing top and bottom surfaces and a side surface extending between the top and bottom surfaces; a computer-readable memory disposed within the axisymmetric device housing; a plurality of microphones disposed within the device housing and distributed radially around the longitudinal axis; a processor disposed within the axisymmetric device housing and coupled to the computer-readable memory, the processor configured to execute computer instructions stored in the computer-readable memory for interacting with a user and processing voice commands received by the plurality of microphones after recognizing a command phrase indicating a user's intent to issue a voice command; a first transducer disposed within the axisymmetric device housing and configured to generate sound waves within a first frequency range; a second transducer disposed within the axisymmetric device housing and configured to generate sound waves within a second frequency range lower than the first frequency range; an outer cover having a pattern formed thereon and disposed over the side surface of the axisymmetric device housing concealing audio components positioned beneath the outer cover, wherein the outer cover provides a consistent exterior surface of the voice-controlled electronic device and allows audio waves generated by the first and second speakers to pass through the outer cover; a touch-sensitive user interface disposed at the top surface of the device housing, the touch-sensitive user interface including first and second touch buttons symmetrically positioned on opposite sides of the longitudinal axis, the first touch button enabling a user to increase speaker volume and the second touch button enabling a user to decrease speaker volume; a power supply unit disposed within the device housing and configured to supply power to the electronic device. 2. The voice-controlled electronic device set forth in claim 1 wherein the device is configured to identify a position of a user by triangulation with the plurality of microphones. 3. The voice-controlled electronic device set forth in claim 1 further comprising: a main logic board disposed within the device housing and having the processor mounted thereon; and a second circuit board disposed within the device housing along a plane that is spaced apart from the user interface and perpendicular to the longitudinal axis, the second printed circuit board having a plurality of LEDs formed thereon that are aligned to illuminate one or more portions of the user-interface. 4. The voice-controlled electronic device set forth in claim 1 wherein the touch-sensitive user interface comprises capacitive touch sensors. 5. The voice-controlled electronic device set forth in claim 4 further comprising one or more light emitting diodes arranged to illuminate different regions of the touch-sensitive user interface. 6. The voice-controlled electronic device set forth in claim 1 further comprising a wireless communication system disposed within the axisymmetric device housing. 7. The voice-controlled electronic device set forth in claim 1 further comprising circuitry configured to implement beamforming techniques to improve audio performance. 8. The voice-controlled electronic device set forth in claim 7 wherein the beamforming techniques generate constructive interference. 9. The voice-controlled electronic device set forth in claim 1 further comprising a plurality of proximity sensors configured to emit pulses of radiation that the processor can use to characterize objects surrounding the voice-controlled electronic device. 10. The voice-controlled electronic device set forth in claim 9 wherein the plurality of proximity sensors emit pulses of infrared radiation. 11. The voice-controlled electronic device set forth in claim 9 wherein the processor is configured to alter an output of the first or second speaker based on feedback from the proximity sensors. 12. The voice-controlled electronic device set forth in claim 1 further comprising an amplifier board electrically coupled to the power supply unit and configured to provide power to the first and second transducers. 13. The voice-controlled electronic device set forth in claim 1 wherein the top and bottom surfaces of the axisymmetric device housing are parallel to each other and generally perpendicular to the side surface. 14. The voice-controlled electronic device set forth in claim 1 wherein the first transducer is part of a transducer array that comprises a plurality of transducers radially distributed around the axisymmetric housing. 15. The voice-controlled electronic device set forth in claim 14 wherein each transducer in the transducer array includes two adjacent transducers and is equally spaced from each of the two adjacent transducers. 16. A voice-controlled electronic device comprising: an axisymmetric device housing having a longitudinal axis bisecting opposing top and bottom surfaces and a side surface extending between the top and bottom surfaces; a computer-readable memory disposed within the axisymmetric device housing; a plurality of microphones disposed within the device housing and distributed radially around the longitudinal axis; a processor disposed within the axisymmetric device housing and coupled to the computer-readable memory, the processor configured to execute computer instructions stored in the computer-readable memory for interacting with a user and processing voice commands received by the plurality of microphones after recognizing a command phrase indicating a user's intent to issue a voice command; a first transducer disposed within the axisymmetric device housing and configured to generate sound waves within a first frequency range; a second transducer disposed within the axisymmetric device housing and configured to generate sound waves within a second frequency range lower than the first frequency range; an outer cover having a pattern formed thereon and disposed over the side surface of the axisymmetric device housing concealing audio components positioned beneath the outer cover, wherein the outer cover provides a consistent exterior surface of the voice-controlled electronic device and allows audio waves generated by the first and second speakers to pass through the outer cover; a touch-sensitive user interface disposed at the top surface of the device housing, the touch-sensitive user interface comprising capacitive touch sensors arranged to implement first and second touch buttons symmetrically positioned on opposite sides of the longitudinal axis, the first touch button enabling a user to increase speaker volume and the second touch button enabling a user to decrease speaker volume; a main logic board disposed within the device housing and having the processor mounted thereon; a second circuit board disposed within the device housing along a plane that is spaced apart from the user interface and perpendicular to the longitudinal axis, the second printed circuit board having a plurality of LEDs formed thereon that are aligned to illuminate one or more portions of the user-interface; a power supply unit disposed within the device housing and configured to supply power to the electronic device; and an amplifier board electrically coupled to the power supply unit and configured to provide power to the first and second transducers. 17. The voice-controlled electronic device set forth in claim 16 further comprising a wireless communication system disposed within the axisymmetric device housing. 18. The voice-controlled electronic device set forth in claim 17 further comprising circuitry configured to implement beamforming techniques to improve audio performance. 19. The voice-controlled electronic device set forth in claim 18 wherein the beamforming techniques generate constructive interference. 20. The voice-controlled electronic device set forth in claim 16 further comprising a plurality of proximity sensors configured to emit pulses of infrared radiation that the processor can use to characterize objects surrounding the voice-controlled electronic device and wherein the processor is further configured to alter an output of the first or second speaker based on feedback from the proximity sensors.
A voice-controlled electronic device that includes an axisymmetric device housing having a longitudinal axis bisecting opposing top and bottom surfaces and a side surface extending between the top and bottom surfaces. The device can further include a plurality of microphones disposed within the device housing and distributed radially around the longitudinal axis; a processor configured to execute computer instructions stored in a computer-readable memory for interacting with a user and processing voice commands received by the plurality of microphones and first and second transducers configured to generate sound waves within different frequency ranges.1. A voice-controlled electronic device comprising: an axisymmetric device housing having a longitudinal axis bisecting opposing top and bottom surfaces and a side surface extending between the top and bottom surfaces; a computer-readable memory disposed within the axisymmetric device housing; a plurality of microphones disposed within the device housing and distributed radially around the longitudinal axis; a processor disposed within the axisymmetric device housing and coupled to the computer-readable memory, the processor configured to execute computer instructions stored in the computer-readable memory for interacting with a user and processing voice commands received by the plurality of microphones after recognizing a command phrase indicating a user's intent to issue a voice command; a first transducer disposed within the axisymmetric device housing and configured to generate sound waves within a first frequency range; a second transducer disposed within the axisymmetric device housing and configured to generate sound waves within a second frequency range lower than the first frequency range; an outer cover having a pattern formed thereon and disposed over the side surface of the axisymmetric device housing concealing audio components positioned beneath the outer cover, wherein the outer cover provides a consistent exterior surface of the voice-controlled electronic device and allows audio waves generated by the first and second speakers to pass through the outer cover; a touch-sensitive user interface disposed at the top surface of the device housing, the touch-sensitive user interface including first and second touch buttons symmetrically positioned on opposite sides of the longitudinal axis, the first touch button enabling a user to increase speaker volume and the second touch button enabling a user to decrease speaker volume; a power supply unit disposed within the device housing and configured to supply power to the electronic device. 2. The voice-controlled electronic device set forth in claim 1 wherein the device is configured to identify a position of a user by triangulation with the plurality of microphones. 3. The voice-controlled electronic device set forth in claim 1 further comprising: a main logic board disposed within the device housing and having the processor mounted thereon; and a second circuit board disposed within the device housing along a plane that is spaced apart from the user interface and perpendicular to the longitudinal axis, the second printed circuit board having a plurality of LEDs formed thereon that are aligned to illuminate one or more portions of the user-interface. 4. The voice-controlled electronic device set forth in claim 1 wherein the touch-sensitive user interface comprises capacitive touch sensors. 5. The voice-controlled electronic device set forth in claim 4 further comprising one or more light emitting diodes arranged to illuminate different regions of the touch-sensitive user interface. 6. The voice-controlled electronic device set forth in claim 1 further comprising a wireless communication system disposed within the axisymmetric device housing. 7. The voice-controlled electronic device set forth in claim 1 further comprising circuitry configured to implement beamforming techniques to improve audio performance. 8. The voice-controlled electronic device set forth in claim 7 wherein the beamforming techniques generate constructive interference. 9. The voice-controlled electronic device set forth in claim 1 further comprising a plurality of proximity sensors configured to emit pulses of radiation that the processor can use to characterize objects surrounding the voice-controlled electronic device. 10. The voice-controlled electronic device set forth in claim 9 wherein the plurality of proximity sensors emit pulses of infrared radiation. 11. The voice-controlled electronic device set forth in claim 9 wherein the processor is configured to alter an output of the first or second speaker based on feedback from the proximity sensors. 12. The voice-controlled electronic device set forth in claim 1 further comprising an amplifier board electrically coupled to the power supply unit and configured to provide power to the first and second transducers. 13. The voice-controlled electronic device set forth in claim 1 wherein the top and bottom surfaces of the axisymmetric device housing are parallel to each other and generally perpendicular to the side surface. 14. The voice-controlled electronic device set forth in claim 1 wherein the first transducer is part of a transducer array that comprises a plurality of transducers radially distributed around the axisymmetric housing. 15. The voice-controlled electronic device set forth in claim 14 wherein each transducer in the transducer array includes two adjacent transducers and is equally spaced from each of the two adjacent transducers. 16. A voice-controlled electronic device comprising: an axisymmetric device housing having a longitudinal axis bisecting opposing top and bottom surfaces and a side surface extending between the top and bottom surfaces; a computer-readable memory disposed within the axisymmetric device housing; a plurality of microphones disposed within the device housing and distributed radially around the longitudinal axis; a processor disposed within the axisymmetric device housing and coupled to the computer-readable memory, the processor configured to execute computer instructions stored in the computer-readable memory for interacting with a user and processing voice commands received by the plurality of microphones after recognizing a command phrase indicating a user's intent to issue a voice command; a first transducer disposed within the axisymmetric device housing and configured to generate sound waves within a first frequency range; a second transducer disposed within the axisymmetric device housing and configured to generate sound waves within a second frequency range lower than the first frequency range; an outer cover having a pattern formed thereon and disposed over the side surface of the axisymmetric device housing concealing audio components positioned beneath the outer cover, wherein the outer cover provides a consistent exterior surface of the voice-controlled electronic device and allows audio waves generated by the first and second speakers to pass through the outer cover; a touch-sensitive user interface disposed at the top surface of the device housing, the touch-sensitive user interface comprising capacitive touch sensors arranged to implement first and second touch buttons symmetrically positioned on opposite sides of the longitudinal axis, the first touch button enabling a user to increase speaker volume and the second touch button enabling a user to decrease speaker volume; a main logic board disposed within the device housing and having the processor mounted thereon; a second circuit board disposed within the device housing along a plane that is spaced apart from the user interface and perpendicular to the longitudinal axis, the second printed circuit board having a plurality of LEDs formed thereon that are aligned to illuminate one or more portions of the user-interface; a power supply unit disposed within the device housing and configured to supply power to the electronic device; and an amplifier board electrically coupled to the power supply unit and configured to provide power to the first and second transducers. 17. The voice-controlled electronic device set forth in claim 16 further comprising a wireless communication system disposed within the axisymmetric device housing. 18. The voice-controlled electronic device set forth in claim 17 further comprising circuitry configured to implement beamforming techniques to improve audio performance. 19. The voice-controlled electronic device set forth in claim 18 wherein the beamforming techniques generate constructive interference. 20. The voice-controlled electronic device set forth in claim 16 further comprising a plurality of proximity sensors configured to emit pulses of infrared radiation that the processor can use to characterize objects surrounding the voice-controlled electronic device and wherein the processor is further configured to alter an output of the first or second speaker based on feedback from the proximity sensors.
2,800
344,424
16,803,931
2,872
Cenicriviroc (CVC) is an orally active antagonist of ligand binding to C-C chemokine receptor type 5 (CCR5) and C-C chemokine receptor type 2 (CCR2). CVC blocks the binding of RANTES, MIP-1α, and MIP-1β to CCR5, and of MCP-1/CCL2 to CCR2. Methods of treating fibrosis and related conditions comprising co-administration of CVC with chemokine antagonists, FXR agonists, high dose vitamin E (>400 iU/d), a peroxisome proliferator-activated receptor alpha (PPAR-α) agonist, PPAR-γ agonist, and/or PPAR-δ agonist are provided herein.
1-40. (canceled) 41. A method of treating fibrosis or a fibrotic disease or condition in a subject in need thereof comprising administering to the subject a therapeutically effective amount of cenicriviroc or a salt or solvate thereof, fumaric acid, and one or more additional active agents; wherein the additional active agent is selected from the group consisting of a GLP-1 receptor agonist, a SGLT2 inhibitor, a DPP-4 inhibitor, an inhibitor of Toll-Like Receptor 4 signaling, an anti-TGFβ antibody, a thiazolidinedione, a PPAR subtypes α and γ agonist, a farnesoid X receptor agonist, and an oral insulin sensitizer. 42. The method of claim 41, wherein the additional active agent is selected from the group consisting of liraglutide, canagliflozin, anagliptin, TAK-242, 1D11, MSDC-0602, pioglitazone, obeticholic acid (OCA), and rosiglitazone. 43. The method of claim 41, wherein the fibrosis or fibrotic disease or condition is liver fibrosis or renal fibrosis. 44. The method of claim 43, wherein the liver fibrosis is associated with non-alcoholic steatohepatitis (NASH), non-alcoholic fatty liver disease (NAFLD), emerging cirrhosis, or non-cirrhotic hepatic fibrosis. 45. The method of claim 41, wherein the subject has a disease or condition selected from the group consisting of alcoholic liver disease, HIV and HCV co-infection, viral hepatitis, type 2 diabetes mellitus (T2DM), metabolic syndrome (MS), and a combination thereof. 46. A method of treating NASH in a subject in need thereof comprising administering to the subject a therapeutically effective amount of cenicriviroc, or a salt or solvate thereof; wherein the NASH is associated with type 2 diabetes mellitus (T2DM), metabolic syndrome (MS), or HIV and HCV co-infection; and one or more additional active agents. 47. The method of claim 46, wherein the additional active agent is selected from the group consisting of a GLP-1 receptor agonist, a SGLT2 inhibitor, a DPP-4 inhibitor, an inhibitor of Toll-Like Receptor 4 signaling, an anti-TGFβ antibody, a thiazolidinedione, a PPAR subtypes α and γ agonist, a farnesoid X receptor agonist, and an oral insulin sensitizer. 48. The method of claim 46, wherein the additional active agent is selected from the group consisting of liraglutide, eanagliflozin, anagliptin, TAK-242, 1D11, MSDC-0602, pioglitazone, obeticholic acid (OCA), and rosiglitazone. 49. The method of claim 46, wherein the cenicriviroc or salt or solvate thereof is administered once per day or twice per day, for one or more treatment cycles, or for 1 to 24 treatment cycles. 50. The method of claim 46, wherein the administration comprises simultaneous administration, sequential administration, overlapping administration, interval administration, continuous administration, or a combination thereof. 51. The method of claim 49, wherein each of the treatment cycle comprises about 7 or more days. 52. The method of claim 46, wherein the administration comprises oral administration, parenteral administration, or a combination thereof. 53. The method of claim 52, wherein the parenteral administration comprises intravenous administration, intraarterial administration, intramuscular administration, subcutaneous administration, intraosseous administration, intrathecal administration, or a combination thereof. 54. The method of claim 46, comprising detecting a level of one or more biological molecules in the subject treated for fibrosis or the fibrotic disease or condition or condition, and determining a treatment regimen based on an increase or decrease in the level of one or more biological molecules, wherein the biological molecule is selected from the group consisting of lipopolysaccharide (LPS), LPs-binding protein (LBP), 16S rDNA, sCD14, intestinal fatty acid binding protein (I-FABP), zonulin-1, Collagen 1a1 and 3a1, TGF-β, fibronectin-1, hs-CRP, IL-1β, IL-6, IL-33, fibrinogen, MCP-1, MIP-1α and -1β, RANTES, sCD163, TGF-β, TNF-a, a biomarker of hepatocyte apoptosis such as CK-18 (caspase-cleaved and total), and a combination thereof. 55. The method of claim 46, comprising detecting a level of one or biological molecules in the subject treated for fibrosis or the fibrotic disease or condition or condition, wherein an increase or decrease in the level of one or more biological molecules compared to a predetermined standard level is predictive of the treatment efficacy of fibrosis or the fibrotic disease or condition, wherein the biological molecule is selected from the group consisting of lipopoly saccharide (LPS), LPs-binding protein (LBP), 16S rDNA, sCD14, intestinal fatty acid binding protein (I-FABP), zonulin-1, Collagen 1a1 and 3a 1, TGF-β, fibronectin-1, hs-CRP, IL-Iβ, IL-6, IL-33, fibrinogen, MCP-1, MIP-1α and -1β, RANTES, sCD163, TGF-β, TNF-α, a biomarker of hepatocyte apoptosis such as CK-18 (caspase-cleaved and total), and a combination thereof. 56. The method of claim 54, wherein the one or more biological molecules are measured in a biological sample from a subject treated for fibrosis or the fibrotic disease or condition; wherein the biological sample is selected from blood, skin, hair follicles, saliva, oral mucous, vaginal mucous, sweat, tears, epithelial tissues, urine, semen, seminal fluid, seminal plasma, prostatic fluid, pre-ejaculatory fluid (Cowper's fluid), excreta, biopsy, ascites, cerebrospinal fluid, lymph, brain, and tissue extract sample or biopsy sample. 57. The method of claim 55, wherein the one or more biological molecules are measured in a biological sample from a subject treated for fibrosis or the fibrotic disease or condition; wherein the biological sample is selected from blood, skin, hair follicles, saliva, oral mucous, vaginal mucous, sweat, tears, epithelial tissues, urine, semen, seminal fluid, seminal plasma, prostatic fluid, pre-ejaculatory fluid (Cowper's fluid), excreta, biopsy, ascites, cerebrospinal fluid, lymph, brain, and tissue extract sample or biopsy sample. 58. A pharmaceutical composition comprising a therapeutically effective amount of cenicriviroc, or a salt or solvate thereof, one or more additional active agents, and one or more pharmaceutically acceptable excipients, wherein the pharmaceutically acceptable excipient comprises fumaric acid.
Cenicriviroc (CVC) is an orally active antagonist of ligand binding to C-C chemokine receptor type 5 (CCR5) and C-C chemokine receptor type 2 (CCR2). CVC blocks the binding of RANTES, MIP-1α, and MIP-1β to CCR5, and of MCP-1/CCL2 to CCR2. Methods of treating fibrosis and related conditions comprising co-administration of CVC with chemokine antagonists, FXR agonists, high dose vitamin E (>400 iU/d), a peroxisome proliferator-activated receptor alpha (PPAR-α) agonist, PPAR-γ agonist, and/or PPAR-δ agonist are provided herein.1-40. (canceled) 41. A method of treating fibrosis or a fibrotic disease or condition in a subject in need thereof comprising administering to the subject a therapeutically effective amount of cenicriviroc or a salt or solvate thereof, fumaric acid, and one or more additional active agents; wherein the additional active agent is selected from the group consisting of a GLP-1 receptor agonist, a SGLT2 inhibitor, a DPP-4 inhibitor, an inhibitor of Toll-Like Receptor 4 signaling, an anti-TGFβ antibody, a thiazolidinedione, a PPAR subtypes α and γ agonist, a farnesoid X receptor agonist, and an oral insulin sensitizer. 42. The method of claim 41, wherein the additional active agent is selected from the group consisting of liraglutide, canagliflozin, anagliptin, TAK-242, 1D11, MSDC-0602, pioglitazone, obeticholic acid (OCA), and rosiglitazone. 43. The method of claim 41, wherein the fibrosis or fibrotic disease or condition is liver fibrosis or renal fibrosis. 44. The method of claim 43, wherein the liver fibrosis is associated with non-alcoholic steatohepatitis (NASH), non-alcoholic fatty liver disease (NAFLD), emerging cirrhosis, or non-cirrhotic hepatic fibrosis. 45. The method of claim 41, wherein the subject has a disease or condition selected from the group consisting of alcoholic liver disease, HIV and HCV co-infection, viral hepatitis, type 2 diabetes mellitus (T2DM), metabolic syndrome (MS), and a combination thereof. 46. A method of treating NASH in a subject in need thereof comprising administering to the subject a therapeutically effective amount of cenicriviroc, or a salt or solvate thereof; wherein the NASH is associated with type 2 diabetes mellitus (T2DM), metabolic syndrome (MS), or HIV and HCV co-infection; and one or more additional active agents. 47. The method of claim 46, wherein the additional active agent is selected from the group consisting of a GLP-1 receptor agonist, a SGLT2 inhibitor, a DPP-4 inhibitor, an inhibitor of Toll-Like Receptor 4 signaling, an anti-TGFβ antibody, a thiazolidinedione, a PPAR subtypes α and γ agonist, a farnesoid X receptor agonist, and an oral insulin sensitizer. 48. The method of claim 46, wherein the additional active agent is selected from the group consisting of liraglutide, eanagliflozin, anagliptin, TAK-242, 1D11, MSDC-0602, pioglitazone, obeticholic acid (OCA), and rosiglitazone. 49. The method of claim 46, wherein the cenicriviroc or salt or solvate thereof is administered once per day or twice per day, for one or more treatment cycles, or for 1 to 24 treatment cycles. 50. The method of claim 46, wherein the administration comprises simultaneous administration, sequential administration, overlapping administration, interval administration, continuous administration, or a combination thereof. 51. The method of claim 49, wherein each of the treatment cycle comprises about 7 or more days. 52. The method of claim 46, wherein the administration comprises oral administration, parenteral administration, or a combination thereof. 53. The method of claim 52, wherein the parenteral administration comprises intravenous administration, intraarterial administration, intramuscular administration, subcutaneous administration, intraosseous administration, intrathecal administration, or a combination thereof. 54. The method of claim 46, comprising detecting a level of one or more biological molecules in the subject treated for fibrosis or the fibrotic disease or condition or condition, and determining a treatment regimen based on an increase or decrease in the level of one or more biological molecules, wherein the biological molecule is selected from the group consisting of lipopolysaccharide (LPS), LPs-binding protein (LBP), 16S rDNA, sCD14, intestinal fatty acid binding protein (I-FABP), zonulin-1, Collagen 1a1 and 3a1, TGF-β, fibronectin-1, hs-CRP, IL-1β, IL-6, IL-33, fibrinogen, MCP-1, MIP-1α and -1β, RANTES, sCD163, TGF-β, TNF-a, a biomarker of hepatocyte apoptosis such as CK-18 (caspase-cleaved and total), and a combination thereof. 55. The method of claim 46, comprising detecting a level of one or biological molecules in the subject treated for fibrosis or the fibrotic disease or condition or condition, wherein an increase or decrease in the level of one or more biological molecules compared to a predetermined standard level is predictive of the treatment efficacy of fibrosis or the fibrotic disease or condition, wherein the biological molecule is selected from the group consisting of lipopoly saccharide (LPS), LPs-binding protein (LBP), 16S rDNA, sCD14, intestinal fatty acid binding protein (I-FABP), zonulin-1, Collagen 1a1 and 3a 1, TGF-β, fibronectin-1, hs-CRP, IL-Iβ, IL-6, IL-33, fibrinogen, MCP-1, MIP-1α and -1β, RANTES, sCD163, TGF-β, TNF-α, a biomarker of hepatocyte apoptosis such as CK-18 (caspase-cleaved and total), and a combination thereof. 56. The method of claim 54, wherein the one or more biological molecules are measured in a biological sample from a subject treated for fibrosis or the fibrotic disease or condition; wherein the biological sample is selected from blood, skin, hair follicles, saliva, oral mucous, vaginal mucous, sweat, tears, epithelial tissues, urine, semen, seminal fluid, seminal plasma, prostatic fluid, pre-ejaculatory fluid (Cowper's fluid), excreta, biopsy, ascites, cerebrospinal fluid, lymph, brain, and tissue extract sample or biopsy sample. 57. The method of claim 55, wherein the one or more biological molecules are measured in a biological sample from a subject treated for fibrosis or the fibrotic disease or condition; wherein the biological sample is selected from blood, skin, hair follicles, saliva, oral mucous, vaginal mucous, sweat, tears, epithelial tissues, urine, semen, seminal fluid, seminal plasma, prostatic fluid, pre-ejaculatory fluid (Cowper's fluid), excreta, biopsy, ascites, cerebrospinal fluid, lymph, brain, and tissue extract sample or biopsy sample. 58. A pharmaceutical composition comprising a therapeutically effective amount of cenicriviroc, or a salt or solvate thereof, one or more additional active agents, and one or more pharmaceutically acceptable excipients, wherein the pharmaceutically acceptable excipient comprises fumaric acid.
2,800
344,425
16,803,936
2,872
Media and other parties worldwide may have the opportunity to buy/order content from users on the LIVEfeed platform, or post specific assignments for users to contribute. Users have to be verified and abide by the platform's terms and conditions/community guidelines.
1. A livefeed information delivery system, comprising: at least one computing device in electronic communication with a platform that exists in an electronic environment created between the computing devices, the platform and a network; the computing devices including components that allow for computation; wherein a user and contributor collaborate to create and consume news and other informational content from single geolocation. 2. The system of claim 1 wherein the user requests news or other informational content from a geolocation and wherein the contributor is in the geolocation and obtains information therefrom. 3. A method of creating and consuming informational content associated with a geolocation, comprising: a user locating informational content for their geolocation; a user consuming informational content for their geolocation; a contributor accepting a request for informational content; or a contributor determining the informational content to create; a contributor creating informational content; attaching a geolocation to the informational content; a moderator reviewing the informational content created by the contributor; a moderator allowing, changing or rejecting the news content; and a user rating the informational content; or the user requesting informational content from geolocation.
Media and other parties worldwide may have the opportunity to buy/order content from users on the LIVEfeed platform, or post specific assignments for users to contribute. Users have to be verified and abide by the platform's terms and conditions/community guidelines.1. A livefeed information delivery system, comprising: at least one computing device in electronic communication with a platform that exists in an electronic environment created between the computing devices, the platform and a network; the computing devices including components that allow for computation; wherein a user and contributor collaborate to create and consume news and other informational content from single geolocation. 2. The system of claim 1 wherein the user requests news or other informational content from a geolocation and wherein the contributor is in the geolocation and obtains information therefrom. 3. A method of creating and consuming informational content associated with a geolocation, comprising: a user locating informational content for their geolocation; a user consuming informational content for their geolocation; a contributor accepting a request for informational content; or a contributor determining the informational content to create; a contributor creating informational content; attaching a geolocation to the informational content; a moderator reviewing the informational content created by the contributor; a moderator allowing, changing or rejecting the news content; and a user rating the informational content; or the user requesting informational content from geolocation.
2,800
344,426
16,803,934
1,794
Media and other parties worldwide may have the opportunity to buy/order content from users on the LIVEfeed platform, or post specific assignments for users to contribute. Users have to be verified and abide by the platform's terms and conditions/community guidelines.
1. A livefeed information delivery system, comprising: at least one computing device in electronic communication with a platform that exists in an electronic environment created between the computing devices, the platform and a network; the computing devices including components that allow for computation; wherein a user and contributor collaborate to create and consume news and other informational content from single geolocation. 2. The system of claim 1 wherein the user requests news or other informational content from a geolocation and wherein the contributor is in the geolocation and obtains information therefrom. 3. A method of creating and consuming informational content associated with a geolocation, comprising: a user locating informational content for their geolocation; a user consuming informational content for their geolocation; a contributor accepting a request for informational content; or a contributor determining the informational content to create; a contributor creating informational content; attaching a geolocation to the informational content; a moderator reviewing the informational content created by the contributor; a moderator allowing, changing or rejecting the news content; and a user rating the informational content; or the user requesting informational content from geolocation.
Media and other parties worldwide may have the opportunity to buy/order content from users on the LIVEfeed platform, or post specific assignments for users to contribute. Users have to be verified and abide by the platform's terms and conditions/community guidelines.1. A livefeed information delivery system, comprising: at least one computing device in electronic communication with a platform that exists in an electronic environment created between the computing devices, the platform and a network; the computing devices including components that allow for computation; wherein a user and contributor collaborate to create and consume news and other informational content from single geolocation. 2. The system of claim 1 wherein the user requests news or other informational content from a geolocation and wherein the contributor is in the geolocation and obtains information therefrom. 3. A method of creating and consuming informational content associated with a geolocation, comprising: a user locating informational content for their geolocation; a user consuming informational content for their geolocation; a contributor accepting a request for informational content; or a contributor determining the informational content to create; a contributor creating informational content; attaching a geolocation to the informational content; a moderator reviewing the informational content created by the contributor; a moderator allowing, changing or rejecting the news content; and a user rating the informational content; or the user requesting informational content from geolocation.
1,700
344,427
16,803,930
3,633
A waste-less cut-less composed wooden panel for a wooden timber buildings construction. Thanks to the use of the steel wood screws positioned in a pattern, the same buckling resistance as in the case of the commercial wooden panels connected by aluminium nails or wood screws has been achieved with a much lower value of the wooden panel thickness, approximately by 30%. Thanks to the manual assembly of individual waste-less cut-less composed wooden panel, up to 82% of wooden material can be saved compared to commercially available prefabricated wooden panels.
1. A waste-less cut-less composed wooden panel (1) for a wooden timber building construction composed from cross laminated wooden planks, where contact walls (6) of the planks (5) are forming the contact walls (3) of the layers (2), by which the individual layers (2) of the panel (1) are fitting closely, where the planks (5) of a second layer (2) are laying in respect of the planks (5) of a first layer (2) at an angle ranging from 45° to 135°, the side walls (7) of the planks (5) in orthogonal projection onto the contact wall (3) of closely fitting layers (2) of the panel (1) are creating projection patterns (13) having a shape of quadrangles, characterized in that the waste-less cut-less composed wooden panel (1) has at least one opening and/or at least one depression and is comprising a static core (14) with buckling resistance at least 45 kN in three meters of height and one meter of width, where the static core (14) is composing from three closely fitting layers (2) of planks (5) with thickness of planks (5) ranging from 19 to 35 mm and width of planks (5) ranging from 80 to 400 mm, where planks (5) of an external layer (2) of the static core (14) are placing vertically in the panel (1) and side walls (7) of planks (5) of the external layers (2) of the static core (14) are fitting closely, planks (5) placing in the same layer (2) have the same thickness and layers (2) of the planks (5) are screwing together by steel wood screws (10) placing in at least two pieces in each projection pattern (13). 2. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, wherein the thickness of the planks (5) placed in the static core (14) ranges from 19 to 32 mm. 3. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, wherein the steel wood screws (10) are placed in at least four pieces in each projection pattern (13). 4. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, wherein the static core (14) is connected with another layer (2) of planks (5). 5. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, wherein the static core (14) is screwed together with another layer (2) of planks (5) by steel wood screws (10). 6. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, further comprising two static cores (14). 7. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 6, further comprising up to 7 layers. 8. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 4, further comprising up to 5 layers. 9. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 7, wherein the static cores (14) are screwed together through another layer (2) of planks (5). 10. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, wherein the buckling resistance of the static core (14) is at least 70 kN in three meters of height and one meter of width, where the thickness of the planks (5) placed in the static core (14) ranges from 25 to 30 mm and the width of the planks (5) placed in the static core (11) ranges from 140 to 200 mm. 11. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, wherein a vapor-barrier and air-tight film (9) is positioned between the two layers (2) of the panel (1). 12. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 2, wherein the side walls (11) of the panel (1) are lined by the lining film (8) impermeable to gases. 13. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 2, wherein the vapor-barrier and air-tight film (9) are made of paper.
A waste-less cut-less composed wooden panel for a wooden timber buildings construction. Thanks to the use of the steel wood screws positioned in a pattern, the same buckling resistance as in the case of the commercial wooden panels connected by aluminium nails or wood screws has been achieved with a much lower value of the wooden panel thickness, approximately by 30%. Thanks to the manual assembly of individual waste-less cut-less composed wooden panel, up to 82% of wooden material can be saved compared to commercially available prefabricated wooden panels.1. A waste-less cut-less composed wooden panel (1) for a wooden timber building construction composed from cross laminated wooden planks, where contact walls (6) of the planks (5) are forming the contact walls (3) of the layers (2), by which the individual layers (2) of the panel (1) are fitting closely, where the planks (5) of a second layer (2) are laying in respect of the planks (5) of a first layer (2) at an angle ranging from 45° to 135°, the side walls (7) of the planks (5) in orthogonal projection onto the contact wall (3) of closely fitting layers (2) of the panel (1) are creating projection patterns (13) having a shape of quadrangles, characterized in that the waste-less cut-less composed wooden panel (1) has at least one opening and/or at least one depression and is comprising a static core (14) with buckling resistance at least 45 kN in three meters of height and one meter of width, where the static core (14) is composing from three closely fitting layers (2) of planks (5) with thickness of planks (5) ranging from 19 to 35 mm and width of planks (5) ranging from 80 to 400 mm, where planks (5) of an external layer (2) of the static core (14) are placing vertically in the panel (1) and side walls (7) of planks (5) of the external layers (2) of the static core (14) are fitting closely, planks (5) placing in the same layer (2) have the same thickness and layers (2) of the planks (5) are screwing together by steel wood screws (10) placing in at least two pieces in each projection pattern (13). 2. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, wherein the thickness of the planks (5) placed in the static core (14) ranges from 19 to 32 mm. 3. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, wherein the steel wood screws (10) are placed in at least four pieces in each projection pattern (13). 4. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, wherein the static core (14) is connected with another layer (2) of planks (5). 5. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, wherein the static core (14) is screwed together with another layer (2) of planks (5) by steel wood screws (10). 6. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, further comprising two static cores (14). 7. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 6, further comprising up to 7 layers. 8. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 4, further comprising up to 5 layers. 9. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 7, wherein the static cores (14) are screwed together through another layer (2) of planks (5). 10. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, wherein the buckling resistance of the static core (14) is at least 70 kN in three meters of height and one meter of width, where the thickness of the planks (5) placed in the static core (14) ranges from 25 to 30 mm and the width of the planks (5) placed in the static core (11) ranges from 140 to 200 mm. 11. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 1, wherein a vapor-barrier and air-tight film (9) is positioned between the two layers (2) of the panel (1). 12. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 2, wherein the side walls (11) of the panel (1) are lined by the lining film (8) impermeable to gases. 13. The waste-less cut-less composed wooden panel (1) for a wooden timber building construction according to claim 2, wherein the vapor-barrier and air-tight film (9) are made of paper.
3,600
344,428
16,803,907
3,633
A magnetically levitating door is disclosed herein. The door may have a bracket having a magnet that is repelled from a magnet of a track. The magnet field of the bracket and the magnet field of the track may have different widths. The track may be disposed adjacent to a door opening. The bracket may have a guard in slidable engagement with the track to limit lateral movement of the magnet of the bracket disposed above and repelling the magnet of the track to levitate the door off of the track while preventing excessive lateral forces on the guard. The bracket may have at least one guide in slidable engagement with the track to secure the engagement of the bracket to the track and maintain vertical alignment of the bracket to the track.
1. A door assembly with a door disposable in front of a door opening and traversable between an open position and closed position, the door assembly comprising: the door being slidable to the open and closed positions, the door defining a length; a bracket attached to the door; a first permanent magnet comprising a plurality of permanent magnets attached to the bracket, the first permanent magnet defining a length and a width and having north and south poles, the width being horizontally transverse to the length of the door; a guard attached to the bracket between each of the plurality of permanent magnets, the guard extending out of the bracket at a direction horizontally transverse to the length of the door; a track disposed adjacent to the door opening, the bracket being slidably mounted to the track; a second permanent magnet attached to the track and having north and south poles, the like poles of the first and second permanent magnet facing each other to repulsively lift an entire weight of the door up, the second permanent magnet having a width horizontally transverse to the length of the door, the second permanent magnet width being different than the first permanent magnet width, the second permanent magnet having a length greater than a length of the door, the first and second permanent magnets being vertically aligned to each other; and at least one guide attached to the bracket along a direction of the length of the first permanent magnet to slidably mount the bracket to the track and maintain vertical alignment and engagement between the bracket and the track as the door is traversed between the open and closed positions; wherein the guard limits lateral movement of the first permanent magnet relative to the second permanent magnet such that the entire weight of the door is lifted magnetically when the door moves laterally. 2. The door assembly of claim 1 wherein the bracket comprises first and second brackets disposed on either side of a vertical midline of the door. 3. The door assembly of claim 1 wherein the length of the second permanent magnet is greater than 80% of the length of the track. 4. The door assembly of claim 1 wherein the second permanent magnet is a plurality of permanent magnets, each permanent magnet of the plurality of permanent magnets of the second permanent magnet having a length less than the length of the door, and the plurality of permanent magnets collectively having a length greater than the length of the door. 5. The door assembly of claim 1 wherein some of the plurality of permanent magnets of the first permanent magnet are disposed on opposed sides of the door so that the door is balanced on the second permanent magnet. 6. The door assembly of claim 1 wherein the second permanent magnet is a single continuous permanent magnet or a plurality of permanent magnets positioned end to end to suspend the door evenly as the door is traversed between the open and closed positions. 7. The door assembly of claim 1 wherein a repelling force of the first and second permanent magnets is equal to or less than a weight of the door. 8. The door assembly of claim 1 where the second permanent magnet width is greater or less than the first permanent magnet width. 9. The door assembly of claim 1 wherein the guard and the at least one guide each have curved surfaces directly and slidably contacting the track. 10. The door assembly of claim 1 wherein the door assembly is a first door assembly further comprising a second door assembly mirroring the first door assembly about a vertical plane and the door of the first door assembly and the door of the second door assembly are slidable independent from each other. 11. The door assembly of claim 1 wherein a magnetic field of the first permanent magnet is wider or narrower compared to a magnetic field of the second permanent. 12. A door assembly with a cover disposable in front of a door opening and traversable between an open position and closed position, the door assembly comprising: the cover being slidable to the open and closed positions, the cover defining a length; a bracket attached to the cover; a first permanent magnet comprising a plurality of permanent magnets attached to the bracket, the first permanent magnet defining a path as the cover slides between the open and closed positions, the first permanent magnet defining a width horizontally transverse to the path of the moving first permanent magnet; a guard attached to the bracket between each of the plurality of permanent magnets, the guard extending out of the bracket at a direction horizontally transverse to the path of the moving first permanent magnet; a track disposed adjacent to the door opening, the bracket being slidably mounted to the track; a second permanent magnet attached to the track, the second permanent magnet defining a width horizontally transverse to the first permanent magnet path; the first and second permanent magnets being vertically aligned and like poles of the first and second permanent magnets facing each other, strengths of the first and second permanent magnets being sufficiently strong to repulsively lift an entire weight of the door; and at least one guide attached to the bracket along the path of the moving first permanent magnet to slidably mount the bracket to the track and maintain vertical alignment and engagement between the track and bracket as the cover is traversed between the open and closed positions, wherein the guard limits lateral movement of the first permanent magnet relative to the second permanent magnet such that the entire weight of the door is lifted magnetically when the door moves laterally. 13. The door assembly of claim 12 wherein the cover is a door or a curtain. 14. The door assembly of claim 12 wherein the track defines a length and the length of the track is greater than the length of the cover. 15. The door assembly of claim 12 wherein a magnetic field of the first permanent magnet has a first range and the magnetic field of the second permanent magnet has a second range, the first range being greater or smaller than the second range. 16. A method of assembling a cover assembly with a cover disposable in front of a cover opening and traversable between an open position and a closed position, the method comprising the steps of: providing the cover being slidable to the open and closed positions after assembly of the cover assembly, the cover defining a length; providing a bracket attachable to the cover; providing a first permanent magnet comprising a plurality of permanent magnets attachable to the bracket, the first permanent magnet defining a path as the cover slides between the open and closed positions, the first permanent magnet defining a width transverse to the path of the first permanent magnet; providing a guard attachable to the bracket between each of the plurality of permanent magnets; providing a track disposable adjacent to the cover opening, the bracket being slidably mountable to the track, the track having a recess along a length of the track; providing a second permanent magnet attachable to the track, the second permanent magnet having a length greater than a length of the cover, the first and second permanent magnets vertically alignable to each other, the second permanent magnet defining a width transverse to the first permanent magnet path, the width of the second permanent magnet width being different than the first permanent magnet width; and providing at least one guide attachable to the bracket; attaching the first permanent magnet to the bracket; attaching the guard to the bracket between each of the plurality of permanent magnets of the first permanent magnet; disposing the track adjacent to the cover opening; attaching the at least one guide to the bracket along the path of the moving first permanent magnet; slidably mounting the bracket to the track, the track being in direct contact with the guard and the at least one guide; vertically aligning the first and second permanent magnets to each other with like poles of the first and second permanent magnets facing each other, the strengths of the first and second permanent magnets being sufficiently strong to repulsively lift an entire weight of the door; and disposing the first and second permanent magnets vertically above each other, the guard limiting lateral movement of the first permanent magnet relative to the second permanent magnet such that the door is repulsively lifted when the door moves laterally. 17. The method of claim 16 wherein the second permanent magnet is a plurality of permanent magnets, each permanent magnet of the plurality of permanent magnets of the second permanent magnet having a length less than the length of the cover, and the plurality of permanent magnets collectively having a length greater than the length of the cover. 18. The method of claim 16 wherein some of the plurality of permanent magnets of the first permanent magnet are disposed on opposed sides of the cover so that the cover is balanced on the second permanent magnet. 19. The method of claim 16 wherein the second permanent magnet is a single continuous permanent magnet or a plurality of permanent magnets positioned end to end to suspend the cover evenly as the cover is traversed between the open and closed positions. 20. The method of claim 16 wherein the providing the first permanent magnet step and the providing the second permanent magnet step include the step of providing the first permanent magnet with a magnetic field wider or narrower than a magnetic field of the second permanent magnet.
A magnetically levitating door is disclosed herein. The door may have a bracket having a magnet that is repelled from a magnet of a track. The magnet field of the bracket and the magnet field of the track may have different widths. The track may be disposed adjacent to a door opening. The bracket may have a guard in slidable engagement with the track to limit lateral movement of the magnet of the bracket disposed above and repelling the magnet of the track to levitate the door off of the track while preventing excessive lateral forces on the guard. The bracket may have at least one guide in slidable engagement with the track to secure the engagement of the bracket to the track and maintain vertical alignment of the bracket to the track.1. A door assembly with a door disposable in front of a door opening and traversable between an open position and closed position, the door assembly comprising: the door being slidable to the open and closed positions, the door defining a length; a bracket attached to the door; a first permanent magnet comprising a plurality of permanent magnets attached to the bracket, the first permanent magnet defining a length and a width and having north and south poles, the width being horizontally transverse to the length of the door; a guard attached to the bracket between each of the plurality of permanent magnets, the guard extending out of the bracket at a direction horizontally transverse to the length of the door; a track disposed adjacent to the door opening, the bracket being slidably mounted to the track; a second permanent magnet attached to the track and having north and south poles, the like poles of the first and second permanent magnet facing each other to repulsively lift an entire weight of the door up, the second permanent magnet having a width horizontally transverse to the length of the door, the second permanent magnet width being different than the first permanent magnet width, the second permanent magnet having a length greater than a length of the door, the first and second permanent magnets being vertically aligned to each other; and at least one guide attached to the bracket along a direction of the length of the first permanent magnet to slidably mount the bracket to the track and maintain vertical alignment and engagement between the bracket and the track as the door is traversed between the open and closed positions; wherein the guard limits lateral movement of the first permanent magnet relative to the second permanent magnet such that the entire weight of the door is lifted magnetically when the door moves laterally. 2. The door assembly of claim 1 wherein the bracket comprises first and second brackets disposed on either side of a vertical midline of the door. 3. The door assembly of claim 1 wherein the length of the second permanent magnet is greater than 80% of the length of the track. 4. The door assembly of claim 1 wherein the second permanent magnet is a plurality of permanent magnets, each permanent magnet of the plurality of permanent magnets of the second permanent magnet having a length less than the length of the door, and the plurality of permanent magnets collectively having a length greater than the length of the door. 5. The door assembly of claim 1 wherein some of the plurality of permanent magnets of the first permanent magnet are disposed on opposed sides of the door so that the door is balanced on the second permanent magnet. 6. The door assembly of claim 1 wherein the second permanent magnet is a single continuous permanent magnet or a plurality of permanent magnets positioned end to end to suspend the door evenly as the door is traversed between the open and closed positions. 7. The door assembly of claim 1 wherein a repelling force of the first and second permanent magnets is equal to or less than a weight of the door. 8. The door assembly of claim 1 where the second permanent magnet width is greater or less than the first permanent magnet width. 9. The door assembly of claim 1 wherein the guard and the at least one guide each have curved surfaces directly and slidably contacting the track. 10. The door assembly of claim 1 wherein the door assembly is a first door assembly further comprising a second door assembly mirroring the first door assembly about a vertical plane and the door of the first door assembly and the door of the second door assembly are slidable independent from each other. 11. The door assembly of claim 1 wherein a magnetic field of the first permanent magnet is wider or narrower compared to a magnetic field of the second permanent. 12. A door assembly with a cover disposable in front of a door opening and traversable between an open position and closed position, the door assembly comprising: the cover being slidable to the open and closed positions, the cover defining a length; a bracket attached to the cover; a first permanent magnet comprising a plurality of permanent magnets attached to the bracket, the first permanent magnet defining a path as the cover slides between the open and closed positions, the first permanent magnet defining a width horizontally transverse to the path of the moving first permanent magnet; a guard attached to the bracket between each of the plurality of permanent magnets, the guard extending out of the bracket at a direction horizontally transverse to the path of the moving first permanent magnet; a track disposed adjacent to the door opening, the bracket being slidably mounted to the track; a second permanent magnet attached to the track, the second permanent magnet defining a width horizontally transverse to the first permanent magnet path; the first and second permanent magnets being vertically aligned and like poles of the first and second permanent magnets facing each other, strengths of the first and second permanent magnets being sufficiently strong to repulsively lift an entire weight of the door; and at least one guide attached to the bracket along the path of the moving first permanent magnet to slidably mount the bracket to the track and maintain vertical alignment and engagement between the track and bracket as the cover is traversed between the open and closed positions, wherein the guard limits lateral movement of the first permanent magnet relative to the second permanent magnet such that the entire weight of the door is lifted magnetically when the door moves laterally. 13. The door assembly of claim 12 wherein the cover is a door or a curtain. 14. The door assembly of claim 12 wherein the track defines a length and the length of the track is greater than the length of the cover. 15. The door assembly of claim 12 wherein a magnetic field of the first permanent magnet has a first range and the magnetic field of the second permanent magnet has a second range, the first range being greater or smaller than the second range. 16. A method of assembling a cover assembly with a cover disposable in front of a cover opening and traversable between an open position and a closed position, the method comprising the steps of: providing the cover being slidable to the open and closed positions after assembly of the cover assembly, the cover defining a length; providing a bracket attachable to the cover; providing a first permanent magnet comprising a plurality of permanent magnets attachable to the bracket, the first permanent magnet defining a path as the cover slides between the open and closed positions, the first permanent magnet defining a width transverse to the path of the first permanent magnet; providing a guard attachable to the bracket between each of the plurality of permanent magnets; providing a track disposable adjacent to the cover opening, the bracket being slidably mountable to the track, the track having a recess along a length of the track; providing a second permanent magnet attachable to the track, the second permanent magnet having a length greater than a length of the cover, the first and second permanent magnets vertically alignable to each other, the second permanent magnet defining a width transverse to the first permanent magnet path, the width of the second permanent magnet width being different than the first permanent magnet width; and providing at least one guide attachable to the bracket; attaching the first permanent magnet to the bracket; attaching the guard to the bracket between each of the plurality of permanent magnets of the first permanent magnet; disposing the track adjacent to the cover opening; attaching the at least one guide to the bracket along the path of the moving first permanent magnet; slidably mounting the bracket to the track, the track being in direct contact with the guard and the at least one guide; vertically aligning the first and second permanent magnets to each other with like poles of the first and second permanent magnets facing each other, the strengths of the first and second permanent magnets being sufficiently strong to repulsively lift an entire weight of the door; and disposing the first and second permanent magnets vertically above each other, the guard limiting lateral movement of the first permanent magnet relative to the second permanent magnet such that the door is repulsively lifted when the door moves laterally. 17. The method of claim 16 wherein the second permanent magnet is a plurality of permanent magnets, each permanent magnet of the plurality of permanent magnets of the second permanent magnet having a length less than the length of the cover, and the plurality of permanent magnets collectively having a length greater than the length of the cover. 18. The method of claim 16 wherein some of the plurality of permanent magnets of the first permanent magnet are disposed on opposed sides of the cover so that the cover is balanced on the second permanent magnet. 19. The method of claim 16 wherein the second permanent magnet is a single continuous permanent magnet or a plurality of permanent magnets positioned end to end to suspend the cover evenly as the cover is traversed between the open and closed positions. 20. The method of claim 16 wherein the providing the first permanent magnet step and the providing the second permanent magnet step include the step of providing the first permanent magnet with a magnetic field wider or narrower than a magnetic field of the second permanent magnet.
3,600
344,429
16,803,942
3,633
An integrated circuit includes a clock control circuit coupled to a reference clock signal node and a plurality of circuits including a voltage regulator, a digital circuit, and an analog circuit. The voltage regulator, in operation, supplies a regulated voltage. The clock control circuit, in operation, generates a system clock. Input/output interface circuitry is coupled to the plurality of circuits and a common input/output node. The input/output interface circuitry, in operation, selectively couples one of the plurality of circuits to the common input/output node.
1. An integrated circuit, comprising: a clock control circuit, which, in operation, generates a system clock, the clock control circuit being coupled to a reference clock signal node that is configured to receive an external clock signal; a plurality of circuits including: a voltage regulator, which, in operation, supplies a regulated voltage; a digital circuit; and an analog circuit; and input/output interface circuitry coupled to the plurality of circuits and a common input/output node, wherein the input/output interface circuitry, in operation, selectively couples one of the plurality of circuits to the common input/output node. 2. The integrated circuit according to claim 1, wherein: the input/output interface circuitry includes an input/output control circuit; and the input/output control circuit is configured to selectively couple one of the digital circuit or the analog circuit of the input/output interface circuitry to the common input/output node based on an oscillator power enable signal issued by the clock control circuit. 3. The integrated circuit according to claim 2, wherein: the common input/output node is configured to couple to a supply input node of an external crystal oscillator; and the clock control circuit is configured to issue the oscillator power enable signal enabling the input/output control circuit to issue a first control signal to enable an analog switch coupled between the analog circuit and the common input/output node and to issue a second control signal to disable a digital input/output circuit coupled between the digital circuit and the common input/output node. 4. The integrated circuit according to claim 2, wherein: an external voltage source is coupled to a supply input node of a crystal oscillator; and the clock control circuit is configured to issue the oscillator power enable signal enabling the input/output control circuit to issue a third control signal to disable an analog switch coupled between the analog circuit and the common input/output node and to issue a fourth control signal to enable a digital input/output circuit coupled between the digital circuit and the common input/output node. 5. The integrated circuit according to claim 1, wherein the digital circuit includes an input digital circuit and an output digital circuit. 6. The integrated circuit according to claim 1, comprising a power coupling analog switch configured to couple the regulated voltage to the common input/output node under a control signal issued by the input/output interface circuitry. 7. The integrated circuit according to claim 1, wherein the power coupling analog switch is external to the input/output interface circuitry. 8. The integrated circuit according to claim 7, comprising an oscillator control circuit that, in operation, supplies an oscillator signal to the clock control circuit; and wherein the power coupling analog switch is included in the oscillator control circuit. 9. The integrated circuit according to claim 6, wherein the input/output interface circuitry is configured to issue a first control signal to control the power coupling analog switch and a second control signal to control the analog circuit. 10. A system, comprising: a processor system including: a clock control circuit, which, in operation, generates a system clock, the clock control circuit being coupled to a reference clock signal node; a plurality of circuits including: a voltage regulator, which, in operation, supplies a regulated voltage; a digital circuit; and an analog circuit; and input/output interface circuitry coupled to the plurality of circuits and a common input/output node, wherein the input/output interface circuitry, in operation, selectively couples one of the plurality of circuits to the common input/output node; and a crystal oscillator coupled to the reference clock signal node. 11. The system of claim 10, wherein the input/output interface circuitry includes: at least one switch coupled between the common input/output node and the analog circuitry; digital input circuitry to receive a digital input from the common input/output node; and digital output circuitry to send a digital output to the common input/output node. 12. The system of claim 11, wherein: the input/output interface circuitry includes an input/output controller; the digital input circuitry is connected to send the digital input to the input/output controller; and the digital output circuitry is connected to receive the digital output from the input/output controller. 13. The system of claim 12, wherein in operation, the input/output controller sends one or more of: a first control signal to control a first state of the at least one switch; a second control signal to control a second state of the digital input circuitry; or a third control signal to control a third state of the digital output circuitry. 14. The system of claim 11, wherein the input/output interface circuitry includes a common rail connected between the common input/output node and each of the at least one switch, the digital input circuitry and the digital output circuitry. 15. The system of claim 11, wherein the voltage regulator is connected to the common input/output node through a first switch of the at least one switch. 16. The system of claim 15, wherein the processor system includes an oscillator control circuit that includes the voltage regulator and the first switch. 17. The system of claim 11, wherein the voltage regulator is connected to the common input/output node through a first switch external to the input/output interface circuitry. 18. The system of claim 17, wherein the input/output interface circuitry includes a common rail, and the first switch is connected to the common rail, the common rail being positioned between the common input/output node and each of the at least one switch, the digital input circuitry and the digital output circuitry. 19. A method, comprising: generating, by a clock control circuit of an integrated circuit, a system clock; selectively coupling one of a plurality of circuits of the integrated circuit to a common input/output node, the plurality of circuits including: a voltage regulator, which, in operation, supplies a regulated voltage; a digital circuit; and an analog circuit; and wherein when the common input/output node is coupled to an input node of an external crystal oscillator, the voltage regulator is coupled to the common input/output node. 20. The method according to claim 19, further comprising issuing, by the clock control circuit, an external oscillator power enable signal that controls coupling the voltage regulator to the common input/output node.
An integrated circuit includes a clock control circuit coupled to a reference clock signal node and a plurality of circuits including a voltage regulator, a digital circuit, and an analog circuit. The voltage regulator, in operation, supplies a regulated voltage. The clock control circuit, in operation, generates a system clock. Input/output interface circuitry is coupled to the plurality of circuits and a common input/output node. The input/output interface circuitry, in operation, selectively couples one of the plurality of circuits to the common input/output node.1. An integrated circuit, comprising: a clock control circuit, which, in operation, generates a system clock, the clock control circuit being coupled to a reference clock signal node that is configured to receive an external clock signal; a plurality of circuits including: a voltage regulator, which, in operation, supplies a regulated voltage; a digital circuit; and an analog circuit; and input/output interface circuitry coupled to the plurality of circuits and a common input/output node, wherein the input/output interface circuitry, in operation, selectively couples one of the plurality of circuits to the common input/output node. 2. The integrated circuit according to claim 1, wherein: the input/output interface circuitry includes an input/output control circuit; and the input/output control circuit is configured to selectively couple one of the digital circuit or the analog circuit of the input/output interface circuitry to the common input/output node based on an oscillator power enable signal issued by the clock control circuit. 3. The integrated circuit according to claim 2, wherein: the common input/output node is configured to couple to a supply input node of an external crystal oscillator; and the clock control circuit is configured to issue the oscillator power enable signal enabling the input/output control circuit to issue a first control signal to enable an analog switch coupled between the analog circuit and the common input/output node and to issue a second control signal to disable a digital input/output circuit coupled between the digital circuit and the common input/output node. 4. The integrated circuit according to claim 2, wherein: an external voltage source is coupled to a supply input node of a crystal oscillator; and the clock control circuit is configured to issue the oscillator power enable signal enabling the input/output control circuit to issue a third control signal to disable an analog switch coupled between the analog circuit and the common input/output node and to issue a fourth control signal to enable a digital input/output circuit coupled between the digital circuit and the common input/output node. 5. The integrated circuit according to claim 1, wherein the digital circuit includes an input digital circuit and an output digital circuit. 6. The integrated circuit according to claim 1, comprising a power coupling analog switch configured to couple the regulated voltage to the common input/output node under a control signal issued by the input/output interface circuitry. 7. The integrated circuit according to claim 1, wherein the power coupling analog switch is external to the input/output interface circuitry. 8. The integrated circuit according to claim 7, comprising an oscillator control circuit that, in operation, supplies an oscillator signal to the clock control circuit; and wherein the power coupling analog switch is included in the oscillator control circuit. 9. The integrated circuit according to claim 6, wherein the input/output interface circuitry is configured to issue a first control signal to control the power coupling analog switch and a second control signal to control the analog circuit. 10. A system, comprising: a processor system including: a clock control circuit, which, in operation, generates a system clock, the clock control circuit being coupled to a reference clock signal node; a plurality of circuits including: a voltage regulator, which, in operation, supplies a regulated voltage; a digital circuit; and an analog circuit; and input/output interface circuitry coupled to the plurality of circuits and a common input/output node, wherein the input/output interface circuitry, in operation, selectively couples one of the plurality of circuits to the common input/output node; and a crystal oscillator coupled to the reference clock signal node. 11. The system of claim 10, wherein the input/output interface circuitry includes: at least one switch coupled between the common input/output node and the analog circuitry; digital input circuitry to receive a digital input from the common input/output node; and digital output circuitry to send a digital output to the common input/output node. 12. The system of claim 11, wherein: the input/output interface circuitry includes an input/output controller; the digital input circuitry is connected to send the digital input to the input/output controller; and the digital output circuitry is connected to receive the digital output from the input/output controller. 13. The system of claim 12, wherein in operation, the input/output controller sends one or more of: a first control signal to control a first state of the at least one switch; a second control signal to control a second state of the digital input circuitry; or a third control signal to control a third state of the digital output circuitry. 14. The system of claim 11, wherein the input/output interface circuitry includes a common rail connected between the common input/output node and each of the at least one switch, the digital input circuitry and the digital output circuitry. 15. The system of claim 11, wherein the voltage regulator is connected to the common input/output node through a first switch of the at least one switch. 16. The system of claim 15, wherein the processor system includes an oscillator control circuit that includes the voltage regulator and the first switch. 17. The system of claim 11, wherein the voltage regulator is connected to the common input/output node through a first switch external to the input/output interface circuitry. 18. The system of claim 17, wherein the input/output interface circuitry includes a common rail, and the first switch is connected to the common rail, the common rail being positioned between the common input/output node and each of the at least one switch, the digital input circuitry and the digital output circuitry. 19. A method, comprising: generating, by a clock control circuit of an integrated circuit, a system clock; selectively coupling one of a plurality of circuits of the integrated circuit to a common input/output node, the plurality of circuits including: a voltage regulator, which, in operation, supplies a regulated voltage; a digital circuit; and an analog circuit; and wherein when the common input/output node is coupled to an input node of an external crystal oscillator, the voltage regulator is coupled to the common input/output node. 20. The method according to claim 19, further comprising issuing, by the clock control circuit, an external oscillator power enable signal that controls coupling the voltage regulator to the common input/output node.
3,600
344,430
16,803,924
3,633
A method for operating a UE for CSI reporting in a wireless communication system is provided. The method comprises receiving, from a BS, configuration information for a CSI report, the CSI report comprising a first CSI part and a second CSI part, the second CSI part including a total of KNZ non-zero coefficients across v layers, determining a priority value for each of the total of KNZ non-zero coefficients, partitioning the second CSI part into Group 0, Group 1, and Group 2 such that, based on the determined priority values of the total of KNZ non-zero coefficients, indicators to non-zero coefficients having higher priority values are included in Group 1 and indicators to non-zero coefficients having lower priority values are included in Group 2, and transmitting, to the BS over an uplink (UL) channel, UL control information (UCI) including Group 0 or (Group 0, Group 1) or (Group 0, Group 1, Group 2) of the second CSI part.
1. A user equipment (UE) for channel state information (CSI) reporting in a wireless communication system, the UE comprising: a transceiver configured to receive, from a base station (BS), configuration information for a CSI report; and a processor operably connected to the transceiver, the processor configured to: determine the CSI report comprising a first CSI part and a second CSI part, the second CSI part including a total of KNZ non-zero coefficients across v layers, wherein v≥1 is a rank value, determine a priority value for each of the total of KNZ non-zero coefficients, and partition the second CSI part into Group 0, Group 1, and Group 2 such that, based on the determined priority values of the total of KNZ non-zero coefficients, indicators to non-zero coefficients having higher priority values are included in Group 1 and indicators to non-zero coefficients having lower priority values are included in Group 2, wherein the transceiver is further configured to transmit, to the BS over an uplink (UL) channel, UL control information (UCI) including Group 0 or (Group 0, Group 1) or (Group 0, Group 1, Group 2) of the second CSI part based on a resource allocation for the UCI transmission, wherein an indicator to a non-zero coefficient includes an amplitude coefficient indicator and a phase coefficient indicator that indicate an amplitude and a phase of the non-zero coefficient, respectively. 2. The UE of claim 1, wherein a number of indicators included in Group 1 and Group 2 is 3. The UE of claim 1, wherein: KNZΣl=1 v Kl NZ, and for each layer l=1, . . . , v: Kl NZ is a number of non-zero coefficients for layer l, the Kl NZ non-zero coefficients correspond to non-zero coefficients of a 2L×M coefficient matrix Cl comprising 2L rows and M columns, and the remaining 2LM−Kl NZ coefficients of the 2L×M coefficient matrix Cl are zero, and the priority value for a coefficient cl,i,m of the coefficient matrix Cl is determined based on layer index (l), row index (i), and column index (m) associated with the coefficient cl,i,m. 4. The UE of claim 3, wherein the priority value for a coefficient cl,i,m is given by P(l, i, m)=2×L×v×F1(m)+v×F2(i)+l, wherein the coefficient cl,i,m with a highest priority value has a lowest associated value P(l, i, m), and F1 and F2 are fixed permutation functions for indices m and i, respectively. 5. The UE of claim 4, wherein F2(i)=i. 6. The UE of claim 3, wherein the processor is further configured to: for each layer l=1, . . . , v, determine a bit sequence comprising 2LM bits to indicate indices (i, m) of the Kl NZ non-zero coefficients; and based on the determined priority values of the total of KNZ non-zero coefficients, partition a total of v×2LM bits across v layers into a first bit sequence and a second bit sequence, wherein indicators to the first bit sequence having a higher priority are included in Group 1 and indicators to the second bit sequence having a lower priority are included in Group 2. 7. The UE in claim 6, wherein the first and second bit sequences comprise 8. The UE of claim 3, wherein the processor is further configured to, for each layer l=1, . . . , v, determine an indicator included in Group 0 that indicates an index (i*l, m*l) of a strongest coefficient cl,i l , m* l =1. 9. The UE of claim 8, wherein the processor is further configured to, for each layer l=1, . . . , v, determine an indicator included in Group 1 that indicates a reference amplitude coefficient that is common for all non-zero coefficients cl,i,m whose index i is such that 10. The UE of claim 3, wherein the processor is further configured to: determine an indicator included in Group 0 that indicates a set of L spatial domain basis vectors comprising columns of A=[a0 a1 . . . aL−1]; and determine, for each layer l=1, . . . , v, an indicator included in Group 1 that indicates a set of M frequency domain (FD) basis vectors comprising columns of Bl=[bl,0 bl,1 . . . bl,M−1], wherein A, B1, and C1 indicate a precoding matrix for each FD unit of a total number (N3) of FD units determined by columns of 11. A base station (BS) in a wireless communication system, the BS comprising: a processor configured to generate channel state information (CSI) configuration information; and a transceiver operably connected to the processor, the transceiver configured to: transmit, to a user equipment (UE), the CSI configuration information for a CSI report, where the CSI report comprises a first CSI part and a second CSI part, and receive, from the UE over an uplink (UL) channel, UL control information (UCI) including Group 0 or (Group 0, Group 1) or (Group 0, Group 1, Group 2) of the second CSI part based on a resource allocation for the UCI transmission, wherein the second CSI part includes a total of KNZ non-zero coefficients across v layers, each non-zero coefficient having a priority value, wherein v≥1 is a rank value, wherein the second CSI part is partitioned into Group 0, Group 1, and Group 2 such that, based on priority values of each of the total of KNZ non-zero coefficients, indicators to non-zero coefficients having higher priority values are included in Group 1 and indicators to non-zero coefficients having lower priority values are included in Group 2, wherein an indicator to a non-zero coefficient includes an amplitude coefficient indicator and a phase coefficient indicator that indicate an amplitude and a phase of the non-zero coefficient, respectively, and wherein a number of indicators included in Group 1 and Group 2 is 12. The BS of claim 11, wherein: KNZ=Σl=1 v Kl NZ; and for each layer l=1, . . . , v: Kl NZ is a number of non-zero coefficients for layer l, the Kl NZ non-zero coefficients correspond to non-zero coefficients of a 2L×M coefficient matrix Cl comprising 2L rows and M columns, and the remaining 2LM−Kl NZ coefficients of the 2L×M coefficient matrix Cl are zero, and the priority value for a coefficient cl,i,m of the coefficient matrix Cl is determined based on layer index (l), row index (i), and column index (m) associated with the coefficient cl,i,m. 13. The BS of claim 12, wherein the priority value for a coefficient cl,i,m is given by P(l, i, m)=2×L×v×F1(m)+v×i+l, wherein the coefficient cl,i,m with a highest priority value has a lowest associated value P(l, i, m), and F1 is a fixed permutation function for index m. 14. The BS of claim 12, wherein: for each layer l=1, . . . , v, a bit sequence comprising 2LM bits to indicate indices (i, m) of the Kl NZ non-zero coefficients is determined; and based on the priority values of each of the total of KNZ non-zero coefficients, a total of v×2LM bits across v layers is partitioned into a first bit sequence and a second bit sequence, wherein indicators to the first bit sequence having a higher priority are included in Group 1 and indicators to the second bit sequence having a lower priority are included in Group 2, wherein the first and second bit sequences comprise 15. The BS of claim 12, wherein: Group 0 includes an indicator that indicates a set of L spatial domain basis vectors comprising columns of A=[a0 a1 . . . aL−1]; and for each layer l=1, . . . , v: Group 0 includes an indicator that indicates an index (i*l, m*l) of a strongest coefficient cl,i* l ,m* l =1; Group 1 includes an indicator that indicates a reference amplitude coefficient that is common for all non-zero coefficients cl,i,m whose index i is such that 16. A method for operating a user equipment (UE) for channel state information (C SI) reporting in a wireless communication system, the method comprising: receiving, from a base station (BS), configuration information for a CSI report; determining the CSI report comprising a first CSI part and a second CSI part, the second CSI part including a total of KNZ non-zero coefficients across v layers, wherein v≥1 is a rank value; determining a priority value for each of the total of KNZ non-zero coefficients; partitioning the second CSI part into Group 0, Group 1, and Group 2 such that, based on the determined priority values of the total of KNZ non-zero coefficients, indicators to non-zero coefficients having higher priority values are included in Group 1 and indicators to non-zero coefficients having lower priority values are included in Group 2; and transmitting, to the BS over an uplink (UL) channel, UL control information (UCI) including Group 0 or (Group 0, Group 1) or (Group 0, Group 1, Group 2) of the second CSI part based on a resource allocation for the UCI transmission, wherein an indicator to a non-zero coefficient includes an amplitude coefficient indicator and a phase coefficient indicator that indicate an amplitude and a phase of the non-zero coefficient, respectively, and wherein a number of indicators included in Group 1 and Group 2 is 17. The method of claim 16, wherein: KNZ=Σl=1 b Kl Nz, and for each layer l=1, . . . , v: Kl NZ is a number of non-zero coefficients for layer l, the Kl NZ non-zero coefficients correspond to non-zero coefficients of a 2L×M coefficient matrix Cl comprising 2L rows and M columns, and the remaining 2LM−Kl NZ coefficients of the 2L×M coefficient matrix Cl are zero, and the priority value for a coefficient of the coefficient matrix Cl is determined based on layer index (l), row index (i), and column index (m) associated with the coefficient cl,i,m. 18. The method of claim 17, wherein the priority value for a coefficient cl,i,m is given by P(l, i, m)=2×L×v×F1(m)+v×i+l, wherein the coefficient cl,i,m with a highest priority value has a lowest associated value P(l, i, m), and F1 is a fixed permutation function for index m. 19. The method of claim 17, further comprising: for each layer l=1, . . . , v, determining a bit sequence comprising 2LM bits to indicate indices (i, m) of the Kl NZ non-zero coefficients, and based on the determined priority values of the total of KNZ non-zero coefficients, partitioning a total of v×2LM bits across v layers into a first bit sequence and a second bit sequence, wherein indicators to the first bit sequence having a higher priority are included in Group 1 and indicators to the second bit sequence having a lower priority are included in Group 2, wherein the first and second bit sequences comprise 20. The method of claim 17, further comprising: determining an indicator included in Group 0 that indicates a set of L spatial domain basis vectors comprising columns of A=[a0 a1 . . . aL−1]; and for each layer l=1, . . . , v: determining an indicator included in Group 0 that indicates an index (i*l, m*l) of a strongest coefficient cl,i* l , m* l =1; determining an indicator included in Group 1 that indicates a reference amplitude coefficient that is common for all non-zero coefficients cl,i,m whose index i is such that
A method for operating a UE for CSI reporting in a wireless communication system is provided. The method comprises receiving, from a BS, configuration information for a CSI report, the CSI report comprising a first CSI part and a second CSI part, the second CSI part including a total of KNZ non-zero coefficients across v layers, determining a priority value for each of the total of KNZ non-zero coefficients, partitioning the second CSI part into Group 0, Group 1, and Group 2 such that, based on the determined priority values of the total of KNZ non-zero coefficients, indicators to non-zero coefficients having higher priority values are included in Group 1 and indicators to non-zero coefficients having lower priority values are included in Group 2, and transmitting, to the BS over an uplink (UL) channel, UL control information (UCI) including Group 0 or (Group 0, Group 1) or (Group 0, Group 1, Group 2) of the second CSI part.1. A user equipment (UE) for channel state information (CSI) reporting in a wireless communication system, the UE comprising: a transceiver configured to receive, from a base station (BS), configuration information for a CSI report; and a processor operably connected to the transceiver, the processor configured to: determine the CSI report comprising a first CSI part and a second CSI part, the second CSI part including a total of KNZ non-zero coefficients across v layers, wherein v≥1 is a rank value, determine a priority value for each of the total of KNZ non-zero coefficients, and partition the second CSI part into Group 0, Group 1, and Group 2 such that, based on the determined priority values of the total of KNZ non-zero coefficients, indicators to non-zero coefficients having higher priority values are included in Group 1 and indicators to non-zero coefficients having lower priority values are included in Group 2, wherein the transceiver is further configured to transmit, to the BS over an uplink (UL) channel, UL control information (UCI) including Group 0 or (Group 0, Group 1) or (Group 0, Group 1, Group 2) of the second CSI part based on a resource allocation for the UCI transmission, wherein an indicator to a non-zero coefficient includes an amplitude coefficient indicator and a phase coefficient indicator that indicate an amplitude and a phase of the non-zero coefficient, respectively. 2. The UE of claim 1, wherein a number of indicators included in Group 1 and Group 2 is 3. The UE of claim 1, wherein: KNZΣl=1 v Kl NZ, and for each layer l=1, . . . , v: Kl NZ is a number of non-zero coefficients for layer l, the Kl NZ non-zero coefficients correspond to non-zero coefficients of a 2L×M coefficient matrix Cl comprising 2L rows and M columns, and the remaining 2LM−Kl NZ coefficients of the 2L×M coefficient matrix Cl are zero, and the priority value for a coefficient cl,i,m of the coefficient matrix Cl is determined based on layer index (l), row index (i), and column index (m) associated with the coefficient cl,i,m. 4. The UE of claim 3, wherein the priority value for a coefficient cl,i,m is given by P(l, i, m)=2×L×v×F1(m)+v×F2(i)+l, wherein the coefficient cl,i,m with a highest priority value has a lowest associated value P(l, i, m), and F1 and F2 are fixed permutation functions for indices m and i, respectively. 5. The UE of claim 4, wherein F2(i)=i. 6. The UE of claim 3, wherein the processor is further configured to: for each layer l=1, . . . , v, determine a bit sequence comprising 2LM bits to indicate indices (i, m) of the Kl NZ non-zero coefficients; and based on the determined priority values of the total of KNZ non-zero coefficients, partition a total of v×2LM bits across v layers into a first bit sequence and a second bit sequence, wherein indicators to the first bit sequence having a higher priority are included in Group 1 and indicators to the second bit sequence having a lower priority are included in Group 2. 7. The UE in claim 6, wherein the first and second bit sequences comprise 8. The UE of claim 3, wherein the processor is further configured to, for each layer l=1, . . . , v, determine an indicator included in Group 0 that indicates an index (i*l, m*l) of a strongest coefficient cl,i l , m* l =1. 9. The UE of claim 8, wherein the processor is further configured to, for each layer l=1, . . . , v, determine an indicator included in Group 1 that indicates a reference amplitude coefficient that is common for all non-zero coefficients cl,i,m whose index i is such that 10. The UE of claim 3, wherein the processor is further configured to: determine an indicator included in Group 0 that indicates a set of L spatial domain basis vectors comprising columns of A=[a0 a1 . . . aL−1]; and determine, for each layer l=1, . . . , v, an indicator included in Group 1 that indicates a set of M frequency domain (FD) basis vectors comprising columns of Bl=[bl,0 bl,1 . . . bl,M−1], wherein A, B1, and C1 indicate a precoding matrix for each FD unit of a total number (N3) of FD units determined by columns of 11. A base station (BS) in a wireless communication system, the BS comprising: a processor configured to generate channel state information (CSI) configuration information; and a transceiver operably connected to the processor, the transceiver configured to: transmit, to a user equipment (UE), the CSI configuration information for a CSI report, where the CSI report comprises a first CSI part and a second CSI part, and receive, from the UE over an uplink (UL) channel, UL control information (UCI) including Group 0 or (Group 0, Group 1) or (Group 0, Group 1, Group 2) of the second CSI part based on a resource allocation for the UCI transmission, wherein the second CSI part includes a total of KNZ non-zero coefficients across v layers, each non-zero coefficient having a priority value, wherein v≥1 is a rank value, wherein the second CSI part is partitioned into Group 0, Group 1, and Group 2 such that, based on priority values of each of the total of KNZ non-zero coefficients, indicators to non-zero coefficients having higher priority values are included in Group 1 and indicators to non-zero coefficients having lower priority values are included in Group 2, wherein an indicator to a non-zero coefficient includes an amplitude coefficient indicator and a phase coefficient indicator that indicate an amplitude and a phase of the non-zero coefficient, respectively, and wherein a number of indicators included in Group 1 and Group 2 is 12. The BS of claim 11, wherein: KNZ=Σl=1 v Kl NZ; and for each layer l=1, . . . , v: Kl NZ is a number of non-zero coefficients for layer l, the Kl NZ non-zero coefficients correspond to non-zero coefficients of a 2L×M coefficient matrix Cl comprising 2L rows and M columns, and the remaining 2LM−Kl NZ coefficients of the 2L×M coefficient matrix Cl are zero, and the priority value for a coefficient cl,i,m of the coefficient matrix Cl is determined based on layer index (l), row index (i), and column index (m) associated with the coefficient cl,i,m. 13. The BS of claim 12, wherein the priority value for a coefficient cl,i,m is given by P(l, i, m)=2×L×v×F1(m)+v×i+l, wherein the coefficient cl,i,m with a highest priority value has a lowest associated value P(l, i, m), and F1 is a fixed permutation function for index m. 14. The BS of claim 12, wherein: for each layer l=1, . . . , v, a bit sequence comprising 2LM bits to indicate indices (i, m) of the Kl NZ non-zero coefficients is determined; and based on the priority values of each of the total of KNZ non-zero coefficients, a total of v×2LM bits across v layers is partitioned into a first bit sequence and a second bit sequence, wherein indicators to the first bit sequence having a higher priority are included in Group 1 and indicators to the second bit sequence having a lower priority are included in Group 2, wherein the first and second bit sequences comprise 15. The BS of claim 12, wherein: Group 0 includes an indicator that indicates a set of L spatial domain basis vectors comprising columns of A=[a0 a1 . . . aL−1]; and for each layer l=1, . . . , v: Group 0 includes an indicator that indicates an index (i*l, m*l) of a strongest coefficient cl,i* l ,m* l =1; Group 1 includes an indicator that indicates a reference amplitude coefficient that is common for all non-zero coefficients cl,i,m whose index i is such that 16. A method for operating a user equipment (UE) for channel state information (C SI) reporting in a wireless communication system, the method comprising: receiving, from a base station (BS), configuration information for a CSI report; determining the CSI report comprising a first CSI part and a second CSI part, the second CSI part including a total of KNZ non-zero coefficients across v layers, wherein v≥1 is a rank value; determining a priority value for each of the total of KNZ non-zero coefficients; partitioning the second CSI part into Group 0, Group 1, and Group 2 such that, based on the determined priority values of the total of KNZ non-zero coefficients, indicators to non-zero coefficients having higher priority values are included in Group 1 and indicators to non-zero coefficients having lower priority values are included in Group 2; and transmitting, to the BS over an uplink (UL) channel, UL control information (UCI) including Group 0 or (Group 0, Group 1) or (Group 0, Group 1, Group 2) of the second CSI part based on a resource allocation for the UCI transmission, wherein an indicator to a non-zero coefficient includes an amplitude coefficient indicator and a phase coefficient indicator that indicate an amplitude and a phase of the non-zero coefficient, respectively, and wherein a number of indicators included in Group 1 and Group 2 is 17. The method of claim 16, wherein: KNZ=Σl=1 b Kl Nz, and for each layer l=1, . . . , v: Kl NZ is a number of non-zero coefficients for layer l, the Kl NZ non-zero coefficients correspond to non-zero coefficients of a 2L×M coefficient matrix Cl comprising 2L rows and M columns, and the remaining 2LM−Kl NZ coefficients of the 2L×M coefficient matrix Cl are zero, and the priority value for a coefficient of the coefficient matrix Cl is determined based on layer index (l), row index (i), and column index (m) associated with the coefficient cl,i,m. 18. The method of claim 17, wherein the priority value for a coefficient cl,i,m is given by P(l, i, m)=2×L×v×F1(m)+v×i+l, wherein the coefficient cl,i,m with a highest priority value has a lowest associated value P(l, i, m), and F1 is a fixed permutation function for index m. 19. The method of claim 17, further comprising: for each layer l=1, . . . , v, determining a bit sequence comprising 2LM bits to indicate indices (i, m) of the Kl NZ non-zero coefficients, and based on the determined priority values of the total of KNZ non-zero coefficients, partitioning a total of v×2LM bits across v layers into a first bit sequence and a second bit sequence, wherein indicators to the first bit sequence having a higher priority are included in Group 1 and indicators to the second bit sequence having a lower priority are included in Group 2, wherein the first and second bit sequences comprise 20. The method of claim 17, further comprising: determining an indicator included in Group 0 that indicates a set of L spatial domain basis vectors comprising columns of A=[a0 a1 . . . aL−1]; and for each layer l=1, . . . , v: determining an indicator included in Group 0 that indicates an index (i*l, m*l) of a strongest coefficient cl,i* l , m* l =1; determining an indicator included in Group 1 that indicates a reference amplitude coefficient that is common for all non-zero coefficients cl,i,m whose index i is such that
3,600
344,431
16,803,921
3,633
A method, performed by a server device, may include receiving a request to activate an application session, the request being received from a user equipment on behalf of a particular application installed on the user equipment. The method may further include determining one or more application requirements associated with the particular application; determining conditions associated with one or more application servers; selecting a particular one of the one or more application servers based on the determined one or more application requirements and based on the determined conditions; and setting up the application session between the user equipment and between the selected particular one of the one or more application servers.
1. A method performed by a server device, the method comprising: receiving, by the server device, a request to perform cloud computing for a particular application installed on a mobile communication device, the request being received from the mobile communication device on behalf of the particular application; determining, by the server device, one or more application requirements associated with the particular application; determining, by the server device, conditions information associated with a plurality of application servers; selecting, by the server device, multiple application servers of the plurality of application servers, to perform the cloud computing for the particular application based on the one or more application requirements and based on the conditions information, wherein the selected application server is configured to perform cloud computing for the particular application; and setting up, by the server device, one or more application sessions between the mobile communication device and the selected multiple application servers. 2. The method of claim 1, wherein selecting the multiple application servers comprises: generating a score for each application server of the plurality of application servers based on comparing one or more of the one or more applications requirements to corresponding conditions information of each respective application server; ranking the plurality of application servers based on the score of each application server of the plurality of application servers; selecting the multiple application servers of the plurality of application servers by selecting a particular number of highest ranked application servers of the plurality of application servers. 3. The method of claim 1, where determining the one or more application requirements comprises: accessing an application database associated with the server device, where the application database stores information about application requirements associated with particular applications. 4. The method of claim 1, where determining the one or more application requirements comprises: receiving information about the one or more application requirements from the mobile communication device. 5. The method of claim 1, wherein determining the conditions information associated with the plurality of application servers comprises: accessing a server database associated with the server device, wherein the server database stores information about the conditions information including network or processing capacity conditions associated with the plurality of application servers. 6. The method of claim 1, wherein determining the conditions information associated with the plurality of application servers comprises: querying the plurality of application servers to provide information about conditions information including network or processing capacity conditions associated with the plurality of application servers. 7. The method of claim 1, wherein the one or more applications requirements include one or more of: a bandwidth requirement associated with the particular application, a maximum delay requirement associated with the particular application, an average delay associated with the particular application, an average packet size associated with the particular application, a peak data rate associated with the particular application, an average data rate associated with the particular application, a maximum error rate associated with the particular application, a memory requirement associated with the particular application, or a location associated with the mobile communication device. 8. The method of claim 1, wherein the conditions information associated with the plurality of application servers include one or more of: supported applications associated with a particular one of the plurality of application servers, an available bandwidth associated with the particular one of the plurality of application servers, an average delay associated with the particular one of the plurality of application servers, an average packet size associated with the particular one of the plurality of application servers, an average data rate associated with the particular one of the plurality of application servers, an average error rate associated with the particular one of the plurality of application servers, a memory capacity associated with the particular one of the plurality of application servers, or a server location associated with the particular one of the plurality of application servers. 9. The method of claim 1, further comprising: receiving, from the mobile communication device, a request for conditions information associated with the plurality of application servers; providing, to the mobile communication device, the conditions information associated with the plurality of application servers; and receiving, from the mobile communication device, an indication that the particular application will operate in a reduced mode, wherein the reduced mode is associated with a different set of application requirements. 10. The method of claim 1, wherein setting up the one or more application sessions between the mobile communication device and the multiple application servers comprises: providing multiple network addresses associated with the multiple application servers to the mobile communication device; and informing each application server of the multiple application servers that the respective application server of the multiple application servers was selected for an application session with the particular application. 11. A service device, comprising: one or more processors; one or more memories storing instructions which, when executed by the one or more processors, cause the one or more processors to perform: receiving a request to perform cloud computing for a particular application installed on a mobile communication device, the request being received from the mobile communication device on behalf of the particular application; determining one or more application requirements associated with the particular application; determining conditions information associated with a plurality of application servers; selecting multiple application servers of the plurality of application servers, to perform the cloud computing for the particular application based on the one or more application requirements and based on the conditions information, wherein the selected application server is configured to perform cloud computing for the particular application; and setting up one or more application sessions between the mobile communication device and the selected multiple application servers. 12. The service device of claim 11, wherein selecting the multiple application servers comprises: generating a score for each application server of the plurality of application servers based on comparing one or more of the one or more applications requirements to corresponding conditions information of each respective application server; ranking the plurality of application servers based on the score of each application server of the plurality of application servers; selecting the multiple application servers of the plurality of application servers by selecting a particular number of highest ranked application servers of the plurality of application servers. 13. The service device of claim 11, where determining the one or more application requirements comprises: accessing an application database associated with the server device, where the application database stores information about application requirements associated with particular applications. 14. The service device of claim 11, where determining the one or more application requirements comprises: receiving information about the one or more application requirements from the mobile communication device. 15. The service device of claim 11, wherein determining the conditions information associated with the plurality of application servers comprises: accessing a server database associated with the server device, wherein the server database stores information about the conditions information including network or processing capacity conditions associated with the plurality of application servers. 16. The service device of claim 11, wherein determining the conditions information associated with the plurality of application servers comprises: querying the plurality of application servers to provide information about conditions information including network or processing capacity conditions associated with the plurality of application servers. 17. The service device of claim 11, wherein the one or more applications requirements include one or more of: a bandwidth requirement associated with the particular application, a maximum delay requirement associated with the particular application, an average delay associated with the particular application, an average packet size associated with the particular application, a peak data rate associated with the particular application, an average data rate associated with the particular application, a maximum error rate associated with the particular application, a memory requirement associated with the particular application, or a location associated with the mobile communication device. 18. The service device of claim 11, wherein the conditions information associated with the plurality of application servers include one or more of: supported applications associated with a particular one of the plurality of application servers, an available bandwidth associated with the particular one of the plurality of application servers, an average delay associated with the particular one of the plurality of application servers, an average packet size associated with the particular one of the plurality of application servers, an average data rate associated with the particular one of the plurality of application servers, an average error rate associated with the particular one of the plurality of application servers, a memory capacity associated with the particular one of the plurality of application servers, or a server location associated with the particular one of the plurality of application servers. 19. The service device of claim 11, further comprising: receiving, from the mobile communication device, a request for conditions information associated with the plurality of application servers; providing, to the mobile communication device, the conditions information associated with the plurality of application servers; and receiving, from the mobile communication device, an indication that the particular application will operate in a reduced mode, wherein the reduced mode is associated with a different set of application requirements. 20. The service device of claim 11, wherein setting up the one or more application sessions between the mobile communication device and the multiple application servers comprises: providing multiple network addresses associated with the multiple application servers to the mobile communication device; and informing each application server of the multiple application servers that the respective application server of the multiple application servers was selected for an application session with the particular application.
A method, performed by a server device, may include receiving a request to activate an application session, the request being received from a user equipment on behalf of a particular application installed on the user equipment. The method may further include determining one or more application requirements associated with the particular application; determining conditions associated with one or more application servers; selecting a particular one of the one or more application servers based on the determined one or more application requirements and based on the determined conditions; and setting up the application session between the user equipment and between the selected particular one of the one or more application servers.1. A method performed by a server device, the method comprising: receiving, by the server device, a request to perform cloud computing for a particular application installed on a mobile communication device, the request being received from the mobile communication device on behalf of the particular application; determining, by the server device, one or more application requirements associated with the particular application; determining, by the server device, conditions information associated with a plurality of application servers; selecting, by the server device, multiple application servers of the plurality of application servers, to perform the cloud computing for the particular application based on the one or more application requirements and based on the conditions information, wherein the selected application server is configured to perform cloud computing for the particular application; and setting up, by the server device, one or more application sessions between the mobile communication device and the selected multiple application servers. 2. The method of claim 1, wherein selecting the multiple application servers comprises: generating a score for each application server of the plurality of application servers based on comparing one or more of the one or more applications requirements to corresponding conditions information of each respective application server; ranking the plurality of application servers based on the score of each application server of the plurality of application servers; selecting the multiple application servers of the plurality of application servers by selecting a particular number of highest ranked application servers of the plurality of application servers. 3. The method of claim 1, where determining the one or more application requirements comprises: accessing an application database associated with the server device, where the application database stores information about application requirements associated with particular applications. 4. The method of claim 1, where determining the one or more application requirements comprises: receiving information about the one or more application requirements from the mobile communication device. 5. The method of claim 1, wherein determining the conditions information associated with the plurality of application servers comprises: accessing a server database associated with the server device, wherein the server database stores information about the conditions information including network or processing capacity conditions associated with the plurality of application servers. 6. The method of claim 1, wherein determining the conditions information associated with the plurality of application servers comprises: querying the plurality of application servers to provide information about conditions information including network or processing capacity conditions associated with the plurality of application servers. 7. The method of claim 1, wherein the one or more applications requirements include one or more of: a bandwidth requirement associated with the particular application, a maximum delay requirement associated with the particular application, an average delay associated with the particular application, an average packet size associated with the particular application, a peak data rate associated with the particular application, an average data rate associated with the particular application, a maximum error rate associated with the particular application, a memory requirement associated with the particular application, or a location associated with the mobile communication device. 8. The method of claim 1, wherein the conditions information associated with the plurality of application servers include one or more of: supported applications associated with a particular one of the plurality of application servers, an available bandwidth associated with the particular one of the plurality of application servers, an average delay associated with the particular one of the plurality of application servers, an average packet size associated with the particular one of the plurality of application servers, an average data rate associated with the particular one of the plurality of application servers, an average error rate associated with the particular one of the plurality of application servers, a memory capacity associated with the particular one of the plurality of application servers, or a server location associated with the particular one of the plurality of application servers. 9. The method of claim 1, further comprising: receiving, from the mobile communication device, a request for conditions information associated with the plurality of application servers; providing, to the mobile communication device, the conditions information associated with the plurality of application servers; and receiving, from the mobile communication device, an indication that the particular application will operate in a reduced mode, wherein the reduced mode is associated with a different set of application requirements. 10. The method of claim 1, wherein setting up the one or more application sessions between the mobile communication device and the multiple application servers comprises: providing multiple network addresses associated with the multiple application servers to the mobile communication device; and informing each application server of the multiple application servers that the respective application server of the multiple application servers was selected for an application session with the particular application. 11. A service device, comprising: one or more processors; one or more memories storing instructions which, when executed by the one or more processors, cause the one or more processors to perform: receiving a request to perform cloud computing for a particular application installed on a mobile communication device, the request being received from the mobile communication device on behalf of the particular application; determining one or more application requirements associated with the particular application; determining conditions information associated with a plurality of application servers; selecting multiple application servers of the plurality of application servers, to perform the cloud computing for the particular application based on the one or more application requirements and based on the conditions information, wherein the selected application server is configured to perform cloud computing for the particular application; and setting up one or more application sessions between the mobile communication device and the selected multiple application servers. 12. The service device of claim 11, wherein selecting the multiple application servers comprises: generating a score for each application server of the plurality of application servers based on comparing one or more of the one or more applications requirements to corresponding conditions information of each respective application server; ranking the plurality of application servers based on the score of each application server of the plurality of application servers; selecting the multiple application servers of the plurality of application servers by selecting a particular number of highest ranked application servers of the plurality of application servers. 13. The service device of claim 11, where determining the one or more application requirements comprises: accessing an application database associated with the server device, where the application database stores information about application requirements associated with particular applications. 14. The service device of claim 11, where determining the one or more application requirements comprises: receiving information about the one or more application requirements from the mobile communication device. 15. The service device of claim 11, wherein determining the conditions information associated with the plurality of application servers comprises: accessing a server database associated with the server device, wherein the server database stores information about the conditions information including network or processing capacity conditions associated with the plurality of application servers. 16. The service device of claim 11, wherein determining the conditions information associated with the plurality of application servers comprises: querying the plurality of application servers to provide information about conditions information including network or processing capacity conditions associated with the plurality of application servers. 17. The service device of claim 11, wherein the one or more applications requirements include one or more of: a bandwidth requirement associated with the particular application, a maximum delay requirement associated with the particular application, an average delay associated with the particular application, an average packet size associated with the particular application, a peak data rate associated with the particular application, an average data rate associated with the particular application, a maximum error rate associated with the particular application, a memory requirement associated with the particular application, or a location associated with the mobile communication device. 18. The service device of claim 11, wherein the conditions information associated with the plurality of application servers include one or more of: supported applications associated with a particular one of the plurality of application servers, an available bandwidth associated with the particular one of the plurality of application servers, an average delay associated with the particular one of the plurality of application servers, an average packet size associated with the particular one of the plurality of application servers, an average data rate associated with the particular one of the plurality of application servers, an average error rate associated with the particular one of the plurality of application servers, a memory capacity associated with the particular one of the plurality of application servers, or a server location associated with the particular one of the plurality of application servers. 19. The service device of claim 11, further comprising: receiving, from the mobile communication device, a request for conditions information associated with the plurality of application servers; providing, to the mobile communication device, the conditions information associated with the plurality of application servers; and receiving, from the mobile communication device, an indication that the particular application will operate in a reduced mode, wherein the reduced mode is associated with a different set of application requirements. 20. The service device of claim 11, wherein setting up the one or more application sessions between the mobile communication device and the multiple application servers comprises: providing multiple network addresses associated with the multiple application servers to the mobile communication device; and informing each application server of the multiple application servers that the respective application server of the multiple application servers was selected for an application session with the particular application.
3,600
344,432
16,803,929
2,473
A method for sending a paging message includes: determining that a current user equipment (UE) belongs to a first service group or a second service group, if there is a paging request from the current UE; sending a first paging message to all UEs in the first small service group to which the current UE belongs through one of a plurality of first POs according to first configuration information which is pre-generated, if the current UE belongs to the first service group; and carrying a paging indication through one of the plurality of first POs and sending a second paging message to the UE indicated by the paging indication through one second PO according to second configuration information which is pre-generated, if the current UE belongs to the second service group, wherein the paging indication is configured to indicate an identification of all the UEs in the second small service group to which the current UE belongs.
1. A method for sending a paging message, which is applied to a base station, comprising: determining that a current user equipment (UE) belongs to a first service group or a second service group, in a case where there is a paging request from the current UE, wherein the first service group comprises a first large service group or a first small service group, the second service group comprises a second large service group or a second small service group, and specifically, the first large service group comprises at least one of the first small service group, and the second large service group comprises at least one of the second small service group; sending a first paging message to all UEs in the first small service group to which the current UE belongs through one of a plurality of first paging occasions POs according to first configuration information which is pre-generated, in a case where the current UE belongs to the first service group; and carrying a paging indication through one of the plurality of the first POs and sending a second paging message to the UE indicated by the paging indication through one second PO according to second configuration information which is pre-generated, in a case where the current UE belongs to the second service group, wherein the paging indication is configured to indicate an identification of all the UEs in the second small service group to which the current UE belongs. 2. The method according to claim 1, further comprising, prior to the determining that a current user equipment UE belongs to a first service group or a second service group: receiving a first service request sent by the UE, and sending the first service request to a core network; and receiving the identification of the UE belonging to the first large service group returned by the core network according to the first service request, and classifying the identification of the UE not belonging to the first large service group to the second large service group. 3. The method according to claim 2, further comprising, after the classifying the identification of the UE not belonging to the first large service group to the second large service group: dividing the first large service group into at least one of the first small service group, and dividing the second large service group into at least one of the second small service group. 4. The method according to claim 1, further comprising, prior to the sending a first paging message to all UEs of the first small service group to which the current UE belongs through one of a plurality of first paging occasions POs according to first configuration information which is pre-generated: generating the first configuration information and the second configuration information, and sending the first configuration information and the second configuration information to the UE, wherein the first configuration information comprises one of the plurality of the first POs allocated to the UE belonging to the first service group, and a physical downlink control channel PDCCH and a physical downlink shared channel PDSCH corresponding to an allocated first PO and being configured to transmit the first paging message, and the second configuration information comprises the identification of the first PO for carrying the paging indication, the second PO allocated to the UE belonging to the second service group, and the PDCCH and the PDSCH corresponding to the second PO and being configured to transmit the second paging message. 5. A method for receiving a paging message, which is applied to a user equipment (UE), comprising: determining that a current UE belongs to a first service group or a second service group, wherein the first service group comprises a first large service group or a first small service group, and the second service group comprises a second large service group or a second small service group; analyzing one of a plurality of first paging occasions POs according to first configuration information which is pre-received so as to obtain a first paging message, in a case where the current UE belongs to the first service group; and in a case where the current UE belongs to the second service group, analyzing second configuration information which is pre-received, to obtain a paging indication, and analyzing a second PO to obtain a second paging message when an identification of the current UE is the same as one of the identifications of the UE indicated by the paging indication. 6. The method according to claim 5, further comprising: receiving the first configuration information and the second configuration information sent by a base station, wherein the first configuration information comprises one of the plurality of the first POs allocated to the UE belonging to the first service group, and a physical downlink control channel PDCCH and a physical downlink shared channel PDSCH corresponding to an allocated first PO and being configured to transmit the first paging message, and the second configuration information comprises the identification of the first PO for carrying the paging indication, the second PO allocated to the UE belonging to the second service group, and the PDCCH and the PDSCH corresponding to the second PO and being configured to transmit the second paging message. 7. The method according to claim 6, wherein the analyzing one of a plurality of first paging occasions PO according to first configuration information which is pre-received to obtain a first paging message comprises: analyzing the PDCCH, corresponding to the first PO configured by the first configuration information and being configured to transmit the first paging message, to obtain paging control information; and analyzing the PDSCH, corresponding to the first PO configured by the first configuration information and being configured to transmit the first paging message, according to the paging control information to obtain the first paging message. 8. The method according to claim 6, wherein the analyzing a second PO to obtain a second paging message comprises: analyzing the PDCCH, corresponding to the second PO and being configured to transmit the second paging message, to obtain paging control information; and analyzing the PDSCH, corresponding to the second PO and being configured to transmit the second paging message, according to the paging control information to obtain the second paging message. 9. Abase station implementing the method according to claim 1, comprising: a processor; and memory having instructions stored thereon for execution by the processor to implement operations of the method. 10. A user equipment implementing the method according to claim 5, comprising: a processor; and memory having instructions stored thereon for execution by the processor to implement operations of the method. 11. A non-transitory computer-readable storage medium, having computer programs stored thereon for execution by a processor to implement steps of the method according to claim 1. 12. A non-transitory computer-readable storage medium, having computer programs stored thereon for execution by a processor to implement steps of the method according to claim 5. 13. A device for sending a paging message, which is applied to a base station, comprising: a processor; and memory having instructions stored thereon, that when being executed by the processor, cause the processor to: determine that a current user equipment UE belongs to a first service group or a second service group, in a case where there is a paging request from the current UE, wherein the first service group comprises a first large service group or a first small service group, the second service group comprises a second large service group or a second small service group, the first large service group comprises at least one of the first small service group, and the second large service group comprises at least one of the second small service group; send a first paging message to all UEs in the first small service group to which the current UE belongs through one of a plurality of first paging occasions POs according to first configuration information which is pre-generated, in a case where the current UE belongs to the first service group; and carry a paging indication through one of the plurality of the first POs and send a second paging message to the UE indicated by the paging indication through one second PO according to second configuration information which is pre-generated, in a case where the current UE belongs to the second service group, wherein the paging indication is configured to indicate an identification of all the UEs in the second small service group to which the current UE belongs. 14. The device according to claim 13, wherein the processor is further caused to, before determining that a current user equipment UE belongs to a first service group or a second service group: receive a first service request sent by the UE, and send the first service request to a core network; and receive the identification of the UE belonging to the first large service group returned by the core network according to the first service request, and classify the identification of the UE not belonging to the first large service group to the second large service group. 15. The device according to claim 14, wherein the processor is further caused to, after classifying the identification of the UE not belonging to the first large service group to the second large service group: divide the first large service group into at least one of the first small service group, and divide the second large service group into at least one of the second small service group. 16. The device according to claim 13, wherein the processor is further caused to, before sending a first paging message to all UEs of the first small service group to which the current UE belongs through one of a plurality of first paging occasions POs according to first configuration information which is pre-generated: generate the first configuration information and the second configuration information, and send the first configuration information and the second configuration information to the UE, wherein the first configuration information comprises one of the plurality of the first POs allocated to the UE belonging to the first service group, and a physical downlink control channel PDCCH and a physical downlink shared channel PDSCH corresponding to an allocated first PO and being configured to transmit the first paging message, and the second configuration information comprises the identification of the first PO for carrying the paging indication, the second PO allocated to the UE belonging to the second service group, and the PDCCH and the PDSCH corresponding to the second PO and being configured to transmit the second paging message. 17. A device for receiving a paging message implementing the method according to claim 5, which is applied to a user equipment, comprising: a processor; and memory having instructions stored thereon for execution by the processor to implement operations of the method. 18. A communication system implementing the method according to claim 1, comprising the base station, wherein the base station is configured to satisfy both a low low-latency paging requirement of a low-latency UE, and a paging requirement of a non-low-latency UE, to thereby effectively save resources. 19. The communication system of claim 18, further comprising the current UE, wherein in a case that the current UE belongs to the first service group, one of a plurality of first POs is analyzed according to first configuration information which is pre-received to obtain a first paging message; and in a case that the current UE does not belong to the first service group, second configuration information which is pre-received is analyzed to obtain a paging indication and a second PO is analyzed to obtain a second paging message when an identification of the current UE is located in the identification of the UE indicated by the paging indication.
A method for sending a paging message includes: determining that a current user equipment (UE) belongs to a first service group or a second service group, if there is a paging request from the current UE; sending a first paging message to all UEs in the first small service group to which the current UE belongs through one of a plurality of first POs according to first configuration information which is pre-generated, if the current UE belongs to the first service group; and carrying a paging indication through one of the plurality of first POs and sending a second paging message to the UE indicated by the paging indication through one second PO according to second configuration information which is pre-generated, if the current UE belongs to the second service group, wherein the paging indication is configured to indicate an identification of all the UEs in the second small service group to which the current UE belongs.1. A method for sending a paging message, which is applied to a base station, comprising: determining that a current user equipment (UE) belongs to a first service group or a second service group, in a case where there is a paging request from the current UE, wherein the first service group comprises a first large service group or a first small service group, the second service group comprises a second large service group or a second small service group, and specifically, the first large service group comprises at least one of the first small service group, and the second large service group comprises at least one of the second small service group; sending a first paging message to all UEs in the first small service group to which the current UE belongs through one of a plurality of first paging occasions POs according to first configuration information which is pre-generated, in a case where the current UE belongs to the first service group; and carrying a paging indication through one of the plurality of the first POs and sending a second paging message to the UE indicated by the paging indication through one second PO according to second configuration information which is pre-generated, in a case where the current UE belongs to the second service group, wherein the paging indication is configured to indicate an identification of all the UEs in the second small service group to which the current UE belongs. 2. The method according to claim 1, further comprising, prior to the determining that a current user equipment UE belongs to a first service group or a second service group: receiving a first service request sent by the UE, and sending the first service request to a core network; and receiving the identification of the UE belonging to the first large service group returned by the core network according to the first service request, and classifying the identification of the UE not belonging to the first large service group to the second large service group. 3. The method according to claim 2, further comprising, after the classifying the identification of the UE not belonging to the first large service group to the second large service group: dividing the first large service group into at least one of the first small service group, and dividing the second large service group into at least one of the second small service group. 4. The method according to claim 1, further comprising, prior to the sending a first paging message to all UEs of the first small service group to which the current UE belongs through one of a plurality of first paging occasions POs according to first configuration information which is pre-generated: generating the first configuration information and the second configuration information, and sending the first configuration information and the second configuration information to the UE, wherein the first configuration information comprises one of the plurality of the first POs allocated to the UE belonging to the first service group, and a physical downlink control channel PDCCH and a physical downlink shared channel PDSCH corresponding to an allocated first PO and being configured to transmit the first paging message, and the second configuration information comprises the identification of the first PO for carrying the paging indication, the second PO allocated to the UE belonging to the second service group, and the PDCCH and the PDSCH corresponding to the second PO and being configured to transmit the second paging message. 5. A method for receiving a paging message, which is applied to a user equipment (UE), comprising: determining that a current UE belongs to a first service group or a second service group, wherein the first service group comprises a first large service group or a first small service group, and the second service group comprises a second large service group or a second small service group; analyzing one of a plurality of first paging occasions POs according to first configuration information which is pre-received so as to obtain a first paging message, in a case where the current UE belongs to the first service group; and in a case where the current UE belongs to the second service group, analyzing second configuration information which is pre-received, to obtain a paging indication, and analyzing a second PO to obtain a second paging message when an identification of the current UE is the same as one of the identifications of the UE indicated by the paging indication. 6. The method according to claim 5, further comprising: receiving the first configuration information and the second configuration information sent by a base station, wherein the first configuration information comprises one of the plurality of the first POs allocated to the UE belonging to the first service group, and a physical downlink control channel PDCCH and a physical downlink shared channel PDSCH corresponding to an allocated first PO and being configured to transmit the first paging message, and the second configuration information comprises the identification of the first PO for carrying the paging indication, the second PO allocated to the UE belonging to the second service group, and the PDCCH and the PDSCH corresponding to the second PO and being configured to transmit the second paging message. 7. The method according to claim 6, wherein the analyzing one of a plurality of first paging occasions PO according to first configuration information which is pre-received to obtain a first paging message comprises: analyzing the PDCCH, corresponding to the first PO configured by the first configuration information and being configured to transmit the first paging message, to obtain paging control information; and analyzing the PDSCH, corresponding to the first PO configured by the first configuration information and being configured to transmit the first paging message, according to the paging control information to obtain the first paging message. 8. The method according to claim 6, wherein the analyzing a second PO to obtain a second paging message comprises: analyzing the PDCCH, corresponding to the second PO and being configured to transmit the second paging message, to obtain paging control information; and analyzing the PDSCH, corresponding to the second PO and being configured to transmit the second paging message, according to the paging control information to obtain the second paging message. 9. Abase station implementing the method according to claim 1, comprising: a processor; and memory having instructions stored thereon for execution by the processor to implement operations of the method. 10. A user equipment implementing the method according to claim 5, comprising: a processor; and memory having instructions stored thereon for execution by the processor to implement operations of the method. 11. A non-transitory computer-readable storage medium, having computer programs stored thereon for execution by a processor to implement steps of the method according to claim 1. 12. A non-transitory computer-readable storage medium, having computer programs stored thereon for execution by a processor to implement steps of the method according to claim 5. 13. A device for sending a paging message, which is applied to a base station, comprising: a processor; and memory having instructions stored thereon, that when being executed by the processor, cause the processor to: determine that a current user equipment UE belongs to a first service group or a second service group, in a case where there is a paging request from the current UE, wherein the first service group comprises a first large service group or a first small service group, the second service group comprises a second large service group or a second small service group, the first large service group comprises at least one of the first small service group, and the second large service group comprises at least one of the second small service group; send a first paging message to all UEs in the first small service group to which the current UE belongs through one of a plurality of first paging occasions POs according to first configuration information which is pre-generated, in a case where the current UE belongs to the first service group; and carry a paging indication through one of the plurality of the first POs and send a second paging message to the UE indicated by the paging indication through one second PO according to second configuration information which is pre-generated, in a case where the current UE belongs to the second service group, wherein the paging indication is configured to indicate an identification of all the UEs in the second small service group to which the current UE belongs. 14. The device according to claim 13, wherein the processor is further caused to, before determining that a current user equipment UE belongs to a first service group or a second service group: receive a first service request sent by the UE, and send the first service request to a core network; and receive the identification of the UE belonging to the first large service group returned by the core network according to the first service request, and classify the identification of the UE not belonging to the first large service group to the second large service group. 15. The device according to claim 14, wherein the processor is further caused to, after classifying the identification of the UE not belonging to the first large service group to the second large service group: divide the first large service group into at least one of the first small service group, and divide the second large service group into at least one of the second small service group. 16. The device according to claim 13, wherein the processor is further caused to, before sending a first paging message to all UEs of the first small service group to which the current UE belongs through one of a plurality of first paging occasions POs according to first configuration information which is pre-generated: generate the first configuration information and the second configuration information, and send the first configuration information and the second configuration information to the UE, wherein the first configuration information comprises one of the plurality of the first POs allocated to the UE belonging to the first service group, and a physical downlink control channel PDCCH and a physical downlink shared channel PDSCH corresponding to an allocated first PO and being configured to transmit the first paging message, and the second configuration information comprises the identification of the first PO for carrying the paging indication, the second PO allocated to the UE belonging to the second service group, and the PDCCH and the PDSCH corresponding to the second PO and being configured to transmit the second paging message. 17. A device for receiving a paging message implementing the method according to claim 5, which is applied to a user equipment, comprising: a processor; and memory having instructions stored thereon for execution by the processor to implement operations of the method. 18. A communication system implementing the method according to claim 1, comprising the base station, wherein the base station is configured to satisfy both a low low-latency paging requirement of a low-latency UE, and a paging requirement of a non-low-latency UE, to thereby effectively save resources. 19. The communication system of claim 18, further comprising the current UE, wherein in a case that the current UE belongs to the first service group, one of a plurality of first POs is analyzed according to first configuration information which is pre-received to obtain a first paging message; and in a case that the current UE does not belong to the first service group, second configuration information which is pre-received is analyzed to obtain a paging indication and a second PO is analyzed to obtain a second paging message when an identification of the current UE is located in the identification of the UE indicated by the paging indication.
2,400
344,433
16,803,914
2,473
An RF (radio frequency) positioning system and related method for automated or assisted eye-docking in ophthalmic surgery. The system includes an RF detector system on a laser head and an RFID tag on a patient interface to be mounted on the patient's eye. The detector system includes four RF antennas located on a horizontal plane for detecting RF signals from the RFID tag, where one pair of antennas are located along the X direction at equal distances from the optical axis of the laser head and another pair are located along the Y direction at equal distances from the optical axis. Based on relative strengths and phase difference of the RF signals detected by each pair of antennas, the RF detector system determines whether the patient interface is centered on the optical axis. The RF detector system controls the laser head to move toward the patient interface until the latter is centered on the optical axis.
1. An ophthalmic surgical laser system comprising: a laser delivery head, including optics which define an optical axis for delivering a laser beam to an eye of a patient; and an RF (radio frequency) detector system, which includes three or more RF antennas and a control device electrically coupled to the three or more antennas, wherein the three or more antennas are affixed on the laser delivery head and located in a plane perpendicular to the optical axis forming an equal-sided polygon centered at the optical axis, and wherein the control device is configured to control each of the three or more antennas to measure an RF signal, and based on the measured RF signals by the three or more antennas, to determine whether or not an external RF antenna that has generated the RF signal is located within a predetermined distance from the optical axis. 2. (canceled) 3. The ophthalmic surgical laser system of claim 1, wherein each of the three or more antennas is configured to measure high and low signal levels of the RF signal and the RF detector system is configured to derive respective strengths of the RF signal from the measured high and low signal levels of the RF signal. 4. The ophthalmic surgical laser system of claim 1, wherein the predetermined distance is 1 mm. 5. (canceled) 6. The ophthalmic surgical laser system of claim 1, wherein the three or more antennas have identical structures. 7. The ophthalmic surgical laser system of claim 1, wherein the RF detector system further includes an additional RF antenna located outside of the plane, wherein the control device is further configured to control the additional antenna to measure the RF signal, and wherein the control device is further configured to determine, based on the measured RF signals by the three or more antennas and the additional antenna, a relative position of the external RF antenna that generated the RF signal in a direction along the optical axis. 8. The ophthalmic surgical laser system of claim 1, wherein the control device is configured to move the laser delivery head based on the measured RF signals by the three or more antennas. 9. The ophthalmic surgical laser system of claim 8, wherein the control device is configured to move the laser delivery head toward the external RF antenna. 10. An ophthalmic surgical laser system comprising: a patient interface device which includes: a body having an annular shape and defining a central area for accommodating an optical path of a laser beam and a central axis within the central area; an annular skirt located at one end of the body; and an RF (radio frequency) antenna having a ring shaped coil disposed on the body along a perimeter of the annular shape and around the central area, the coil being centered on the central axis of the body; a laser delivery head, including optics which define an optical axis for delivering a laser beam to an eye of a patient; an RF detector system, which includes three or more RF antenna and a control device electrically coupled to the three or more antennas, wherein the three or more antennas are affixed on the laser delivery head and located in a plane perpendicular to the optical axis forming an equal-sided polygon centered at the optical axis, wherein the RF antenna of the patient interface device is configured to generate an RF signal, and wherein the control device is configured to control each of the three or more antennas to measure the RF signal, and based on the measured RF signals by the three or more antennas, to determine whether or not the RF antenna of the patient interface device is located within a predetermined distance from the optical axis. 11. The ophthalmic surgical laser system of claim 10, wherein the patient interface device further comprises circuitry disposed on the body, where the circuitry and the RF antenna forms an active RFID (Radio-frequency identification) device. 12. The ophthalmic surgical laser system of claim 10, wherein the patient interface device further comprises circuitry disposed on the body, where the circuitry and the RF antenna forms a passive RFID (Radio-frequency identification) device. 13. A method for docking an ophthalmic surgical laser system to a patient's eye, the laser system comprising a laser delivery head which defines an optical axis for delivering a laser beam into the patient's eye, and an RF (radio frequency) detector system, the RF detector system including three or more RF antennas and a control device, wherein the three or more antennas are affixed on the laser delivery head and located in a plane perpendicular to the optical axis forming an equal-sided polygon centered at the optical axis, and wherein the control device is operatively coupled to the laser delivery head, the method comprising: (a) installing a patient interface device on the patient's eye, the patient interface device including an RF antenna configured to generate an RF signal; (b) the control device controlling each of the three or more antennas to measure the RF signal generated by the RF antenna of the patient interface device; (c) based on the measured RF signals by the three or more antennas, the control device determining whether or not the RF antenna of the patient interface device is located within a predetermined distance from the optical axis; and (d) based on the measured RF signals by the three or more antennas, the control device moving the laser delivery head toward the RF antenna of the patient interface device. 14. (canceled) 15. The method of claim 14, wherein step (b) includes the control device controlling each of the three or more antennas to measure high and low signal levels of the RF signal and deriving respective strengths of the RF signal from the measured high and low signal levels of the RF signal. 16. The method of claim 13, wherein the predetermined distance is 1 mm. 17. The method of claim 13, wherein the RF detector system further includes an additional RF antenna located outside of the plane, wherein the method further comprises: the control device controlling the additional antenna to measure the RF signal generated by the RF antenna of the patient interface device; and based on the measured RF signals by the three or more antennas and the additional antenna, the control device determining a relative position of the RF antenna of the patient interface device in a direction along the optical axis. 18. The method of claim 13, wherein in step (b) includes the control device controlling the three or more antennas to sequentially measure the RF signal generated by the RF antenna of the patient interface device. 19. (canceled)
An RF (radio frequency) positioning system and related method for automated or assisted eye-docking in ophthalmic surgery. The system includes an RF detector system on a laser head and an RFID tag on a patient interface to be mounted on the patient's eye. The detector system includes four RF antennas located on a horizontal plane for detecting RF signals from the RFID tag, where one pair of antennas are located along the X direction at equal distances from the optical axis of the laser head and another pair are located along the Y direction at equal distances from the optical axis. Based on relative strengths and phase difference of the RF signals detected by each pair of antennas, the RF detector system determines whether the patient interface is centered on the optical axis. The RF detector system controls the laser head to move toward the patient interface until the latter is centered on the optical axis.1. An ophthalmic surgical laser system comprising: a laser delivery head, including optics which define an optical axis for delivering a laser beam to an eye of a patient; and an RF (radio frequency) detector system, which includes three or more RF antennas and a control device electrically coupled to the three or more antennas, wherein the three or more antennas are affixed on the laser delivery head and located in a plane perpendicular to the optical axis forming an equal-sided polygon centered at the optical axis, and wherein the control device is configured to control each of the three or more antennas to measure an RF signal, and based on the measured RF signals by the three or more antennas, to determine whether or not an external RF antenna that has generated the RF signal is located within a predetermined distance from the optical axis. 2. (canceled) 3. The ophthalmic surgical laser system of claim 1, wherein each of the three or more antennas is configured to measure high and low signal levels of the RF signal and the RF detector system is configured to derive respective strengths of the RF signal from the measured high and low signal levels of the RF signal. 4. The ophthalmic surgical laser system of claim 1, wherein the predetermined distance is 1 mm. 5. (canceled) 6. The ophthalmic surgical laser system of claim 1, wherein the three or more antennas have identical structures. 7. The ophthalmic surgical laser system of claim 1, wherein the RF detector system further includes an additional RF antenna located outside of the plane, wherein the control device is further configured to control the additional antenna to measure the RF signal, and wherein the control device is further configured to determine, based on the measured RF signals by the three or more antennas and the additional antenna, a relative position of the external RF antenna that generated the RF signal in a direction along the optical axis. 8. The ophthalmic surgical laser system of claim 1, wherein the control device is configured to move the laser delivery head based on the measured RF signals by the three or more antennas. 9. The ophthalmic surgical laser system of claim 8, wherein the control device is configured to move the laser delivery head toward the external RF antenna. 10. An ophthalmic surgical laser system comprising: a patient interface device which includes: a body having an annular shape and defining a central area for accommodating an optical path of a laser beam and a central axis within the central area; an annular skirt located at one end of the body; and an RF (radio frequency) antenna having a ring shaped coil disposed on the body along a perimeter of the annular shape and around the central area, the coil being centered on the central axis of the body; a laser delivery head, including optics which define an optical axis for delivering a laser beam to an eye of a patient; an RF detector system, which includes three or more RF antenna and a control device electrically coupled to the three or more antennas, wherein the three or more antennas are affixed on the laser delivery head and located in a plane perpendicular to the optical axis forming an equal-sided polygon centered at the optical axis, wherein the RF antenna of the patient interface device is configured to generate an RF signal, and wherein the control device is configured to control each of the three or more antennas to measure the RF signal, and based on the measured RF signals by the three or more antennas, to determine whether or not the RF antenna of the patient interface device is located within a predetermined distance from the optical axis. 11. The ophthalmic surgical laser system of claim 10, wherein the patient interface device further comprises circuitry disposed on the body, where the circuitry and the RF antenna forms an active RFID (Radio-frequency identification) device. 12. The ophthalmic surgical laser system of claim 10, wherein the patient interface device further comprises circuitry disposed on the body, where the circuitry and the RF antenna forms a passive RFID (Radio-frequency identification) device. 13. A method for docking an ophthalmic surgical laser system to a patient's eye, the laser system comprising a laser delivery head which defines an optical axis for delivering a laser beam into the patient's eye, and an RF (radio frequency) detector system, the RF detector system including three or more RF antennas and a control device, wherein the three or more antennas are affixed on the laser delivery head and located in a plane perpendicular to the optical axis forming an equal-sided polygon centered at the optical axis, and wherein the control device is operatively coupled to the laser delivery head, the method comprising: (a) installing a patient interface device on the patient's eye, the patient interface device including an RF antenna configured to generate an RF signal; (b) the control device controlling each of the three or more antennas to measure the RF signal generated by the RF antenna of the patient interface device; (c) based on the measured RF signals by the three or more antennas, the control device determining whether or not the RF antenna of the patient interface device is located within a predetermined distance from the optical axis; and (d) based on the measured RF signals by the three or more antennas, the control device moving the laser delivery head toward the RF antenna of the patient interface device. 14. (canceled) 15. The method of claim 14, wherein step (b) includes the control device controlling each of the three or more antennas to measure high and low signal levels of the RF signal and deriving respective strengths of the RF signal from the measured high and low signal levels of the RF signal. 16. The method of claim 13, wherein the predetermined distance is 1 mm. 17. The method of claim 13, wherein the RF detector system further includes an additional RF antenna located outside of the plane, wherein the method further comprises: the control device controlling the additional antenna to measure the RF signal generated by the RF antenna of the patient interface device; and based on the measured RF signals by the three or more antennas and the additional antenna, the control device determining a relative position of the RF antenna of the patient interface device in a direction along the optical axis. 18. The method of claim 13, wherein in step (b) includes the control device controlling the three or more antennas to sequentially measure the RF signal generated by the RF antenna of the patient interface device. 19. (canceled)
2,400
344,434
16,803,918
2,473
Embodiments extend using sparse Merkle trees for smart synchronization of S3 buckets by overcoming fixed size limitations through creating another Merkle tree when the fixed size limit of the first tree is exceeded, and creating yet another tree when the second tree is filled up, and so on as needed. The method maintains a super Merkle tree of trees, in which each tree can be synchronized separately by keeping a strict division to trees according to generation number. The generation is passed from a source site to a target site during replication operations. Syncing between two data sites is efficient as the super Merkle tree of the source is synced with the super Merkle tree of the target using the hashes on the nodes, as in normal Merkle tree sync operations.
1. A method of synchronizing object data between a source site and a target site, comprising: creating, in each of the source and target sites, an initial Merkle tree having a fixed size with each node having a hashed value of the metadata for the node and that of any children of that node; receiving data to be stored in the initial Merkle tree until the fixed size is reached; creating, upon reaching the fixed size, additional Merkle trees each of a respective fixed size in a sequence of successive additional Merkle trees as each additional Merkle tree receives data in excess of its respective fixed size, each additional Merkle tree having a unique generation number; maintaining the initial Merkle tree and each additional Merkle tree in a super Merkle tree containing Merkle tree leaves, wherein each node of the super Merkle tree has a hash of its child hashes and information regarding its respective generation number; determining, by traversing the super Merkle tree the existence of any missing additional Merkle trees that are in the source site but not in the target site; and copying data of the missing additional Merkle trees from the source site to the target site using hashes on the nodes through a Merkle tree synchronization process. 2. The method of claim 1 further comprising, in the creating additional Merkle trees step: identifying a parent of a next previous generation tree to the added tree; determining whether or not the parent is empty or full; adding, if the parent not empty and P has vacant children, the added tree to the next child at the leaf level of the parent; and setting, if the parent is empty, and itself has a parent then set the parent to its parent, or, if the parent does not have a parent, adding a new root node to the super Merkle tree wherein a first child points to the previous root node. 3. The method of claim 1 the object data comprises Amazon Simple Storage Service (S3) data, and further wherein the Merkle tree is a sparse Merkle tree wherein a hash of an empty node is defined as zero, and includes nodes within the Merkle tree. 4. The method of claim 2 wherein the fixed size of the initial Merkle tree is of size M=c*n, wherein n is a maximum allowed number of elements in the bucket, and c is a single-digit integer constant. 5. The method of claim 4 wherein a size of each subsequent Merkle tree is the same size of the initial Merkle tree. 6. The method of claim 5 wherein a size of each subsequent Merkle tree increases relative to the size of the initial Merkle tree according to a defined sizing policy, and wherein the defined sizing policy comprises one of: increasing a subsequent Merkle tree size by a constant multiplier, or doubling a size of each subsequent Merkle tree or group of Merkle trees after the initial Merkle tree. 7. The method of claim 1 wherein the Merkle tree synchronization process comprises: recursively scanning child nodes of the missing additional Merkle trees to identify data blocks that have different hashes; and sending data corresponding to the different hashes from the source node to the target node. 8. The method of claim 2 wherein the unique generation number is stored as object metadata for each S3 data object. 9. The method of claim 8 wherein a new object of the received data is created in a POST operation by entering an element key and hash of the object value to a current Merkle tree, an existing data object is updated in a PUT operation by deleting its previous version from a previous Merkle tree in which the previous version resides, and an existing data object is deleted in a DELETE operation by fetching a corresponding generation tag for the existing data object and deleting it from the corresponding Merkle tree. 10. The method of claim 10 further comprising: receiving, in the target site, replicated data from the source; traversing the super Merkle tree to find a current Merkle tree; adding the replicated data to the current Merkle tree if it has sufficient space; and creating a new Merkle tree in the super Merkle tree if it does not have sufficient space, and updating hashes of a path to the new Merkle tree. 11. A method of synchronizing object stores in a data backup system, comprising: maintaining a tree of fixed-size Merkle trees for a source site and a target site; maintaining a super Merkle tree containing the fixed-size Merkle trees, wherein each node of the super Merkle tree has a hash of its child hashes and information regarding its respective generation number. receiving data to be replicated from the source site to the target site; storing the received data in a current Merkle tree of the sequence of Merkle trees; creating new Merkle trees as the received data exceeds the fixed size of the current Merkle tree, wherein each new Merkle tree is assigned a unique generation number; and updating hashes of a path to the new Merkle trees. 12. The method of claim 11 further comprising, in the creating new Merkle trees step: identifying a parent of a next previous generation tree to an added tree; determining whether or not the parent is empty or full; adding, if the parent not empty and the parent has vacant children, the added tree to the next child at the leaf level of the parent; and setting, if the parent is empty, and itself has a parent then set the parent to its parent, or, if the parent does not have a parent, adding a new root node to the super Merkle tree wherein a first child points to the previous root node. 13. The method of claim 12 wherein the object data comprises Amazon Simple Storage Service (S3) data, and further wherein the Merkle tree is a sparse Merkle tree wherein a hash of an empty node is defined as zero, and includes nodes within the Merkle tree. 14. The method of claim 13 wherein a size of each subsequent Merkle tree is the same size of the initial Merkle tree. 15. The method of claim 14 wherein a size of each subsequent Merkle tree increases relative to the size of the initial Merkle tree according to a defined sizing policy, and wherein the defined sizing policy comprises one of: increasing a subsequent Merkle tree size by a constant multiplier, or doubling a size of each subsequent Merkle tree or group of Merkle trees after the initial Merkle tree. 16. The method of claim 15 wherein the unique generation number is stored as object metadata for each S3 data object. 17. The method of claim 16 wherein a new object of the received data is created in a POST operation by entering an element key and hash of the object value to a current Merkle tree, an existing data object is updated in a PUT operation by deleting its previous version from a previous Merkle tree in which the previous version resides, and an existing data object is deleted in a DELETE operation by fetching a corresponding generation tag for the existing data object and deleting it from the corresponding Merkle tree. 18. The method of claim 11 wherein an initial Merkle tree of the tree of fixed-size Merkle trees is denoted as Generation 1, a second Merkle tree of the tree of fixed-size Merkle trees is denoted as Generation 2, a third Merkle tree of the tree of fixed-size Merkle trees is denoted as Generation 3, and a fourth Merkle tree of the tree of fixed-size Merkle trees is denoted as Generation 4. 19. The method of claim 18 wherein newly received data is input to a latest generation Merkle tree of the tree of fixed-size Merkle trees. 20. A computer program product, comprising a non-transitory computer-readable medium having a computer-readable program code embodied therein, the computer-readable program code adapted to execute a method of synchronizing object stores in a data backup system, comprising: maintaining a tree of fixed-size Merkle trees for a source site and a target site; maintaining a super Merkle tree containing the fixed-size Merkle trees, wherein each node of the super Merkle tree has a hash of its child hashes and information regarding its respective generation number. receiving data to be replicated from the source site to the target site; storing the received data in a current Merkle tree of the sequence of Merkle trees; creating new Merkle trees as the received data exceeds the fixed size of the current Merkle tree, wherein each new Merkle tree is assigned a unique generation number; and updating hashes of a path to the new Merkle trees.
Embodiments extend using sparse Merkle trees for smart synchronization of S3 buckets by overcoming fixed size limitations through creating another Merkle tree when the fixed size limit of the first tree is exceeded, and creating yet another tree when the second tree is filled up, and so on as needed. The method maintains a super Merkle tree of trees, in which each tree can be synchronized separately by keeping a strict division to trees according to generation number. The generation is passed from a source site to a target site during replication operations. Syncing between two data sites is efficient as the super Merkle tree of the source is synced with the super Merkle tree of the target using the hashes on the nodes, as in normal Merkle tree sync operations.1. A method of synchronizing object data between a source site and a target site, comprising: creating, in each of the source and target sites, an initial Merkle tree having a fixed size with each node having a hashed value of the metadata for the node and that of any children of that node; receiving data to be stored in the initial Merkle tree until the fixed size is reached; creating, upon reaching the fixed size, additional Merkle trees each of a respective fixed size in a sequence of successive additional Merkle trees as each additional Merkle tree receives data in excess of its respective fixed size, each additional Merkle tree having a unique generation number; maintaining the initial Merkle tree and each additional Merkle tree in a super Merkle tree containing Merkle tree leaves, wherein each node of the super Merkle tree has a hash of its child hashes and information regarding its respective generation number; determining, by traversing the super Merkle tree the existence of any missing additional Merkle trees that are in the source site but not in the target site; and copying data of the missing additional Merkle trees from the source site to the target site using hashes on the nodes through a Merkle tree synchronization process. 2. The method of claim 1 further comprising, in the creating additional Merkle trees step: identifying a parent of a next previous generation tree to the added tree; determining whether or not the parent is empty or full; adding, if the parent not empty and P has vacant children, the added tree to the next child at the leaf level of the parent; and setting, if the parent is empty, and itself has a parent then set the parent to its parent, or, if the parent does not have a parent, adding a new root node to the super Merkle tree wherein a first child points to the previous root node. 3. The method of claim 1 the object data comprises Amazon Simple Storage Service (S3) data, and further wherein the Merkle tree is a sparse Merkle tree wherein a hash of an empty node is defined as zero, and includes nodes within the Merkle tree. 4. The method of claim 2 wherein the fixed size of the initial Merkle tree is of size M=c*n, wherein n is a maximum allowed number of elements in the bucket, and c is a single-digit integer constant. 5. The method of claim 4 wherein a size of each subsequent Merkle tree is the same size of the initial Merkle tree. 6. The method of claim 5 wherein a size of each subsequent Merkle tree increases relative to the size of the initial Merkle tree according to a defined sizing policy, and wherein the defined sizing policy comprises one of: increasing a subsequent Merkle tree size by a constant multiplier, or doubling a size of each subsequent Merkle tree or group of Merkle trees after the initial Merkle tree. 7. The method of claim 1 wherein the Merkle tree synchronization process comprises: recursively scanning child nodes of the missing additional Merkle trees to identify data blocks that have different hashes; and sending data corresponding to the different hashes from the source node to the target node. 8. The method of claim 2 wherein the unique generation number is stored as object metadata for each S3 data object. 9. The method of claim 8 wherein a new object of the received data is created in a POST operation by entering an element key and hash of the object value to a current Merkle tree, an existing data object is updated in a PUT operation by deleting its previous version from a previous Merkle tree in which the previous version resides, and an existing data object is deleted in a DELETE operation by fetching a corresponding generation tag for the existing data object and deleting it from the corresponding Merkle tree. 10. The method of claim 10 further comprising: receiving, in the target site, replicated data from the source; traversing the super Merkle tree to find a current Merkle tree; adding the replicated data to the current Merkle tree if it has sufficient space; and creating a new Merkle tree in the super Merkle tree if it does not have sufficient space, and updating hashes of a path to the new Merkle tree. 11. A method of synchronizing object stores in a data backup system, comprising: maintaining a tree of fixed-size Merkle trees for a source site and a target site; maintaining a super Merkle tree containing the fixed-size Merkle trees, wherein each node of the super Merkle tree has a hash of its child hashes and information regarding its respective generation number. receiving data to be replicated from the source site to the target site; storing the received data in a current Merkle tree of the sequence of Merkle trees; creating new Merkle trees as the received data exceeds the fixed size of the current Merkle tree, wherein each new Merkle tree is assigned a unique generation number; and updating hashes of a path to the new Merkle trees. 12. The method of claim 11 further comprising, in the creating new Merkle trees step: identifying a parent of a next previous generation tree to an added tree; determining whether or not the parent is empty or full; adding, if the parent not empty and the parent has vacant children, the added tree to the next child at the leaf level of the parent; and setting, if the parent is empty, and itself has a parent then set the parent to its parent, or, if the parent does not have a parent, adding a new root node to the super Merkle tree wherein a first child points to the previous root node. 13. The method of claim 12 wherein the object data comprises Amazon Simple Storage Service (S3) data, and further wherein the Merkle tree is a sparse Merkle tree wherein a hash of an empty node is defined as zero, and includes nodes within the Merkle tree. 14. The method of claim 13 wherein a size of each subsequent Merkle tree is the same size of the initial Merkle tree. 15. The method of claim 14 wherein a size of each subsequent Merkle tree increases relative to the size of the initial Merkle tree according to a defined sizing policy, and wherein the defined sizing policy comprises one of: increasing a subsequent Merkle tree size by a constant multiplier, or doubling a size of each subsequent Merkle tree or group of Merkle trees after the initial Merkle tree. 16. The method of claim 15 wherein the unique generation number is stored as object metadata for each S3 data object. 17. The method of claim 16 wherein a new object of the received data is created in a POST operation by entering an element key and hash of the object value to a current Merkle tree, an existing data object is updated in a PUT operation by deleting its previous version from a previous Merkle tree in which the previous version resides, and an existing data object is deleted in a DELETE operation by fetching a corresponding generation tag for the existing data object and deleting it from the corresponding Merkle tree. 18. The method of claim 11 wherein an initial Merkle tree of the tree of fixed-size Merkle trees is denoted as Generation 1, a second Merkle tree of the tree of fixed-size Merkle trees is denoted as Generation 2, a third Merkle tree of the tree of fixed-size Merkle trees is denoted as Generation 3, and a fourth Merkle tree of the tree of fixed-size Merkle trees is denoted as Generation 4. 19. The method of claim 18 wherein newly received data is input to a latest generation Merkle tree of the tree of fixed-size Merkle trees. 20. A computer program product, comprising a non-transitory computer-readable medium having a computer-readable program code embodied therein, the computer-readable program code adapted to execute a method of synchronizing object stores in a data backup system, comprising: maintaining a tree of fixed-size Merkle trees for a source site and a target site; maintaining a super Merkle tree containing the fixed-size Merkle trees, wherein each node of the super Merkle tree has a hash of its child hashes and information regarding its respective generation number. receiving data to be replicated from the source site to the target site; storing the received data in a current Merkle tree of the sequence of Merkle trees; creating new Merkle trees as the received data exceeds the fixed size of the current Merkle tree, wherein each new Merkle tree is assigned a unique generation number; and updating hashes of a path to the new Merkle trees.
2,400
344,435
16,803,927
2,473
Disclosed is a novel type of computing apparatus which is integrated within a buoy that obtains the energy required to power its computing operations from winds that travel across the surface of the body of water on which the buoy floats. Additionally, these self-powered computing buoys utilize their close proximity to a body of water in order to significantly lower the cost and complexity of cooling their computing circuits. Computing tasks of an arbitrary nature are supported, as is the incorporation and/or utilization of computing circuits specialized for the execution of specific types of computing tasks. And, each buoy's receipt of a computational task, and its return of a computational result, may be accomplished through the transmission of data across satellite links, fiber optic cables, LAN cables, radio, modulated light, microwaves, and/or any other channel, link, connection, and/or network.
1. A buoyant hashing apparatus, comprising: a buoyant member; a wind-to-electrical-energy converter mounted on the buoyant member; a plurality of integrated circuits, said plurality of integrated circuits energized by the wind-to-electrical-energy converter and adapted for calculating cryptographic hashes. 2. The buoyant hashing apparatus of claim 1, further comprising a data communication system mounted on the buoyant member for communicating computational task specifications to the plurality of integrated circuits. 3. The buoyant hashing apparatus of claim 2, wherein the data communication system includes an antenna. 4. The buoyant hashing apparatus of claim 1, wherein the buoyant member is a spar buoy and the wind-to-electrical-energy converter includes a wind turbine and an electrical generator. 5. The buoyant hashing apparatus of claim 1, further comprising an activation system, and wherein application-specific integrated circuits are turned on by the activation system in response to an increase in electrical power from the wind-to-electrical-energy converter. 6. The buoyant hashing apparatus of claim 1, wherein the plurality of integrated circuits is specialized for calculating hash values for obtaining valid blockchain blocks. 7. The buoyant hashing apparatus of claim 1, wherein the plurality of integrated circuits is disposed below a mean waterline of the buoyant hashing apparatus. 8. The buoyant hashing apparatus of claim 7, further comprising a submerged heat exchanger adapted to communicate heat from the plurality of integrated circuits to a body of water. 9. The buoyant hashing apparatus of claim 1, further comprising a compartment mounted on the buoyant structure and housing an immersion liquid having boiling point lower than that of water, and wherein the plurality of integrated circuits warms the immersion liquid to dissipate heat. 10. A buoyant machine learning apparatus, comprising: a buoyant member; a wind-to-electrical-energy converter mounted on the buoyant member; a plurality of integrated circuits, said plurality of integrated circuits energized by the wind-to-electrical-energy converter and adapted for training of a machine learning model. 11. The buoyant machine learning apparatus of claim 10, further comprising a data communication system mounted on the buoyant member for communicating machine learning task specifications to the plurality of integrated circuits. 12. The buoyant machine learning apparatus of claim 11, wherein the data communication system includes an antenna. 13. The buoyant machine learning apparatus of claim 10, wherein the buoyant member is a spar buoy and the wind-to-electrical-energy converter includes a wind turbine and an electrical generator. 14. The buoyant machine learning apparatus of claim 10, further comprising an activation system, and wherein the integrated circuits are turned on by the activation system in response to an increase in available electrical power from the wind-to-electrical-energy converter. 15. The buoyant machine learning apparatus of claim 10, wherein the plurality of integrated circuits is specialized for training of a neural network. 16. The buoyant machine learning apparatus of claim 10, wherein the plurality of integrated circuits is specialized for performing tensor operations. 17. The buoyant machine learning apparatus of claim 10, wherein the plurality of integrated circuits is disposed below a mean waterline of the buoyant machine learning apparatus. 18. The buoyant machine learning apparatus of claim 10, further comprising a submerged heat exchanger adapted to communicate heat from the plurality of integrated circuits to a body of water. 19. The buoyant machine learning apparatus of claim 10, further comprising a compartment mounted on the buoyant structure and housing an immersion liquid having boiling point lower than that of water, and wherein the plurality of integrated circuits warms the immersion liquid to dissipate heat. 20. A marine hash processing system, comprising: a buoyant hashing apparatus; and a remote task administrator computer; wherein the buoyant hashing apparatus includes a buoyant member, a wind-to-electrical-energy converter mounted on the buoyant member, and a plurality of integrated circuits mounted on the buoyant member; wherein the plurality of integrated circuits is energized by the wind-to-electrical-energy converter and configured for calculating cryptographic hashes; and wherein the remote task administrator computer is configured to transmit blockchain parameters to the buoyant hashing apparatus for deriving cryptographic hash values. 21. The marine hash processing system of claim 20, further comprising a data reception antenna mounted on the buoyant member, and wherein the remote task administrator computer transmits encoded blockchain block header specifications to the buoyant hashing apparatus via the data reception antenna. 22. The marine hash processing system of claim 20, further comprising a data reception antenna mounted on the buoyant member, and wherein the remote task administrator computer transmits encoded blockchain transaction parameters to the buoyant hashing apparatus via the data reception antenna. 23. The marine hash processing system of claim 20, further comprising an activation system, and wherein application-specific integrated circuits are turned on by the activation system in response to an increase in available electrical power. 24. A marine machine learning processing system, comprising: a buoyant machine learning apparatus; and a remote task administrator computer; wherein the buoyant machine learning apparatus includes a buoyant member, a wind-to-electrical-energy converter mounted on the buoyant member, and a plurality of integrated circuits mounted on the buoyant member; wherein the plurality of integrated circuits is energized by the wind-to-electrical-energy converter and configured for training of a machine learning model; and wherein the remote task administrator computer is configured to transmit machine learning task specifications to the buoyant machine learning apparatus for processing. 25. The marine machine learning processing system of claim 24, wherein the buoyant member is a spar buoy. 26. The marine machine learning processing system of claim 24, further comprising an activation system, and wherein the integrated circuits are turned on by the activation system in response to an increase in available electrical power. 27. The marine machine learning processing system of claim 24, further comprising a compartment mounted on the buoyant member and housing an immersion liquid having boiling point lower than that of water, and wherein the plurality of integrated circuits warms the immersion liquid to dissipate heat. 28. The marine machine learning processing system of claim 24, further comprising a data reception antenna mounted on the buoyant member, and wherein the remote task administrator computer transmits encoded machine learning task specifications to the buoyant machine learning apparatus via the data reception antenna. 29. The marine machine learning processing system of claim 24, wherein said plurality of application-specific integrated circuits is configured for training of a neural network. 30. The marine machine learning processing system of claim 24, wherein said plurality of application-specific integrated circuits is specialized for performing tensor operations. 31. A wind-powered marine task processor, comprising: a buoyant computing apparatus having a buoyant structure, a wind turbine mounted on the buoyant structure, a power-take-off, and a plurality of computing processors; said buoyant computing apparatus adapted to float adjacent to an upper surface of a body of water; said wind turbine configured to rotate in response to wind impinging upon the wind turbine; said power-take-off operatively connected to the wind turbine such that the power-take-off generates electrical power in response to rotation of the wind turbine; said plurality of computing processors being energized by electrical power generated by the power-take-off; said plurality of computing processors configured to produce computational results by the execution of computational tasks specified by encoded signals received by the buoyant computing apparatus; wherein the buoyant computing apparatus receives, via encoded signals, computational tasks; and wherein the buoyant computing apparatus transmits, via encoded signals, computational results derived from received computational tasks. 32. The wind-powered marine task processor of claim 31, wherein the power-take-off includes an electrical generator. 33. The wind-powered marine task processor of claim 31, wherein the wind turbine is a horizontal axis wind turbine. 34. The wind-powered marine task processor of claim 31, wherein the plurality of computing processors is disposed below a mean waterline of the buoyant computing apparatus. 35. The wind-powered marine task processors of claim 31, further comprising a propulsion system mounted on the buoyant structure for moving the buoyant computing apparatus on a body of water. 36. The wind-powered marine task processor of claim 31, wherein the plurality of computing processors includes application-specific integrated circuits adapted for calculating cryptographic hash values for producing valid blockchain blocks. 37. The wind-powered marine task processor of claim 31, wherein the plurality of computing processors includes application-specific integrated circuits adapted for training a neural network. 38. The wind-powered marine task processor of claim 31, wherein the plurality of computing processors includes application-specific integrated circuits adapted for performing inference using a neural network. 39. The wind-powered marine task processor of claim 31, wherein the plurality of computing processors is configured for brain simulation. 40. The wind-powered marine task processor of claim 31, further comprising a compartment mounted on the buoyant structure and housing an immersion liquid having boiling point lower than that of water, and wherein the plurality of computing processors warms the immersion liquid to dissipate heat. 41. The wind-powered marine task processor of claim 31, further comprising an activation system, and wherein computing processors are turned on by the activation system in response to an increase in available electrical power. 42. The wind-powered marine task processor of claim 31, further comprising a data communication system for communicating computational task specifications to the buoyant computing apparatus. 43. The wind-powered marine task processor of claim 42, wherein the data communication system includes a phased array antenna coupled to the buoyant computing apparatus. 44. The wind-powered marine task processor of claim 42, wherein the data communication system includes a 5G antenna coupled to the buoyant computing apparatus. 45. The wind-powered marine task processor of claim 42, further comprising a data reception computer positioned upon land and a remote receiving antenna positioned upon land, and wherein the data reception computer processes computational results received from the plurality of computing processors via the remote receiving antenna. 46. The wind-powered marine task processor of claim 42, further comprising a data reception computer positioned upon land and a remote receiving antenna positioned upon land, and wherein the data reception computer relays to a computer network computational results received from the plurality of computing processors via the remote receiving antenna. 47. The wind-powered marine task processor of claim 42, further comprising a submerged heat exchanger for dissipating heat from the plurality of computing processors to a body of water. 48. The wind-powered marine task processor of claim 42, further comprising a heat exchanger disposed above a mean waterline of the buoyant computing apparatus for dissipating heat from the plurality of computing processors to the atmosphere. 49. The wind-powered marine task processor of claim 42, wherein the power-take-off includes a battery. 50. The wind-powered marine task processor of claim 42, further comprising a task administrator computer positioned upon land and a remote transmission antenna positioned upon land, and wherein the task administrator computer operates with the remote transmission antenna to transmit computational task specifications to the plurality of computing processors via the remote transmission antenna. 51. The wind-powered marine task processor of claim 42, wherein the plurality of computing processors is configured to produce a computational result selected from the group consisting of a parameter of a neural network, a parameter of a machine learning model, a parameter of an artificially intelligent system, a cryptocurrency hash value, and a mathematical model parameter consistent with a set of data values. 52. The wind-powered marine task processor of claim 42, wherein the plurality of computing processors includes at least 50 processing units selected from the group consisting of central processing units (CPUs), graphics processing units (GPUs), tensor processing units (TPUs), application-specific integrated circuits (ASICs), and quantum processing units (QPUs). 53. The wind-powered marine task processor of claim 42, wherein at least 50% of the electrical power generated by the power-take-off is consumed by the plurality of computing processors. 54. The wind-powered marine task processor of claim 42, further comprising a submerged electrical cable and connector adapted for coupling with a submerged vessel. 55. The wind-powered marine task processor of claim 42, further comprising a submerged data transmission cable and connector adapted for coupling with a submerged vessel. 56. The wind-powered marine task processor of claim 42, further comprising a local data reception antenna mounted to the buoyant structure, and wherein the buoyant computing apparatus is configured to receive electromagnetically encoded computational task specifications via the local data reception antenna. 57. The wind-powered marine task processor of claim 42, wherein the buoyant structure is a spar buoy. 58. The wind-powered marine task processor of claim 57, wherein the buoyant computing apparatus is adapted to float with a draft at least five times greater than a widest submerged width of the buoyant structure. 59. A buoyant computing apparatus, comprising: a buoyant member; a wind-to-electrical-energy converter mounted on the buoyant member; a computing device powered by the wind-to-electrical-energy converter for generating status information of the buoyant computing apparatus and communicating status information of the buoyant computing apparatus to a remote receiver; and a plurality of computing processors mounted on the buoyant member, said plurality of computing circuits energized by the wind-to-electrical-energy converter and configured to perform computational processing unrelated to generating and communicating status information of the buoyant computing apparatus. 60. The buoyant computing apparatus of claim 59, wherein the plurality of computing processors is configured to derive a computational result selected from the group consisting of a parameter of a neural network, a parameter of a machine learning model, a parameter of an artificially intelligent system, an inference output of a neural network, an inference output of a machine learning model, and inference output of an artificially intelligent system, a cryptocurrency hash value, and a mathematical model consistent with a set of data values.
Disclosed is a novel type of computing apparatus which is integrated within a buoy that obtains the energy required to power its computing operations from winds that travel across the surface of the body of water on which the buoy floats. Additionally, these self-powered computing buoys utilize their close proximity to a body of water in order to significantly lower the cost and complexity of cooling their computing circuits. Computing tasks of an arbitrary nature are supported, as is the incorporation and/or utilization of computing circuits specialized for the execution of specific types of computing tasks. And, each buoy's receipt of a computational task, and its return of a computational result, may be accomplished through the transmission of data across satellite links, fiber optic cables, LAN cables, radio, modulated light, microwaves, and/or any other channel, link, connection, and/or network.1. A buoyant hashing apparatus, comprising: a buoyant member; a wind-to-electrical-energy converter mounted on the buoyant member; a plurality of integrated circuits, said plurality of integrated circuits energized by the wind-to-electrical-energy converter and adapted for calculating cryptographic hashes. 2. The buoyant hashing apparatus of claim 1, further comprising a data communication system mounted on the buoyant member for communicating computational task specifications to the plurality of integrated circuits. 3. The buoyant hashing apparatus of claim 2, wherein the data communication system includes an antenna. 4. The buoyant hashing apparatus of claim 1, wherein the buoyant member is a spar buoy and the wind-to-electrical-energy converter includes a wind turbine and an electrical generator. 5. The buoyant hashing apparatus of claim 1, further comprising an activation system, and wherein application-specific integrated circuits are turned on by the activation system in response to an increase in electrical power from the wind-to-electrical-energy converter. 6. The buoyant hashing apparatus of claim 1, wherein the plurality of integrated circuits is specialized for calculating hash values for obtaining valid blockchain blocks. 7. The buoyant hashing apparatus of claim 1, wherein the plurality of integrated circuits is disposed below a mean waterline of the buoyant hashing apparatus. 8. The buoyant hashing apparatus of claim 7, further comprising a submerged heat exchanger adapted to communicate heat from the plurality of integrated circuits to a body of water. 9. The buoyant hashing apparatus of claim 1, further comprising a compartment mounted on the buoyant structure and housing an immersion liquid having boiling point lower than that of water, and wherein the plurality of integrated circuits warms the immersion liquid to dissipate heat. 10. A buoyant machine learning apparatus, comprising: a buoyant member; a wind-to-electrical-energy converter mounted on the buoyant member; a plurality of integrated circuits, said plurality of integrated circuits energized by the wind-to-electrical-energy converter and adapted for training of a machine learning model. 11. The buoyant machine learning apparatus of claim 10, further comprising a data communication system mounted on the buoyant member for communicating machine learning task specifications to the plurality of integrated circuits. 12. The buoyant machine learning apparatus of claim 11, wherein the data communication system includes an antenna. 13. The buoyant machine learning apparatus of claim 10, wherein the buoyant member is a spar buoy and the wind-to-electrical-energy converter includes a wind turbine and an electrical generator. 14. The buoyant machine learning apparatus of claim 10, further comprising an activation system, and wherein the integrated circuits are turned on by the activation system in response to an increase in available electrical power from the wind-to-electrical-energy converter. 15. The buoyant machine learning apparatus of claim 10, wherein the plurality of integrated circuits is specialized for training of a neural network. 16. The buoyant machine learning apparatus of claim 10, wherein the plurality of integrated circuits is specialized for performing tensor operations. 17. The buoyant machine learning apparatus of claim 10, wherein the plurality of integrated circuits is disposed below a mean waterline of the buoyant machine learning apparatus. 18. The buoyant machine learning apparatus of claim 10, further comprising a submerged heat exchanger adapted to communicate heat from the plurality of integrated circuits to a body of water. 19. The buoyant machine learning apparatus of claim 10, further comprising a compartment mounted on the buoyant structure and housing an immersion liquid having boiling point lower than that of water, and wherein the plurality of integrated circuits warms the immersion liquid to dissipate heat. 20. A marine hash processing system, comprising: a buoyant hashing apparatus; and a remote task administrator computer; wherein the buoyant hashing apparatus includes a buoyant member, a wind-to-electrical-energy converter mounted on the buoyant member, and a plurality of integrated circuits mounted on the buoyant member; wherein the plurality of integrated circuits is energized by the wind-to-electrical-energy converter and configured for calculating cryptographic hashes; and wherein the remote task administrator computer is configured to transmit blockchain parameters to the buoyant hashing apparatus for deriving cryptographic hash values. 21. The marine hash processing system of claim 20, further comprising a data reception antenna mounted on the buoyant member, and wherein the remote task administrator computer transmits encoded blockchain block header specifications to the buoyant hashing apparatus via the data reception antenna. 22. The marine hash processing system of claim 20, further comprising a data reception antenna mounted on the buoyant member, and wherein the remote task administrator computer transmits encoded blockchain transaction parameters to the buoyant hashing apparatus via the data reception antenna. 23. The marine hash processing system of claim 20, further comprising an activation system, and wherein application-specific integrated circuits are turned on by the activation system in response to an increase in available electrical power. 24. A marine machine learning processing system, comprising: a buoyant machine learning apparatus; and a remote task administrator computer; wherein the buoyant machine learning apparatus includes a buoyant member, a wind-to-electrical-energy converter mounted on the buoyant member, and a plurality of integrated circuits mounted on the buoyant member; wherein the plurality of integrated circuits is energized by the wind-to-electrical-energy converter and configured for training of a machine learning model; and wherein the remote task administrator computer is configured to transmit machine learning task specifications to the buoyant machine learning apparatus for processing. 25. The marine machine learning processing system of claim 24, wherein the buoyant member is a spar buoy. 26. The marine machine learning processing system of claim 24, further comprising an activation system, and wherein the integrated circuits are turned on by the activation system in response to an increase in available electrical power. 27. The marine machine learning processing system of claim 24, further comprising a compartment mounted on the buoyant member and housing an immersion liquid having boiling point lower than that of water, and wherein the plurality of integrated circuits warms the immersion liquid to dissipate heat. 28. The marine machine learning processing system of claim 24, further comprising a data reception antenna mounted on the buoyant member, and wherein the remote task administrator computer transmits encoded machine learning task specifications to the buoyant machine learning apparatus via the data reception antenna. 29. The marine machine learning processing system of claim 24, wherein said plurality of application-specific integrated circuits is configured for training of a neural network. 30. The marine machine learning processing system of claim 24, wherein said plurality of application-specific integrated circuits is specialized for performing tensor operations. 31. A wind-powered marine task processor, comprising: a buoyant computing apparatus having a buoyant structure, a wind turbine mounted on the buoyant structure, a power-take-off, and a plurality of computing processors; said buoyant computing apparatus adapted to float adjacent to an upper surface of a body of water; said wind turbine configured to rotate in response to wind impinging upon the wind turbine; said power-take-off operatively connected to the wind turbine such that the power-take-off generates electrical power in response to rotation of the wind turbine; said plurality of computing processors being energized by electrical power generated by the power-take-off; said plurality of computing processors configured to produce computational results by the execution of computational tasks specified by encoded signals received by the buoyant computing apparatus; wherein the buoyant computing apparatus receives, via encoded signals, computational tasks; and wherein the buoyant computing apparatus transmits, via encoded signals, computational results derived from received computational tasks. 32. The wind-powered marine task processor of claim 31, wherein the power-take-off includes an electrical generator. 33. The wind-powered marine task processor of claim 31, wherein the wind turbine is a horizontal axis wind turbine. 34. The wind-powered marine task processor of claim 31, wherein the plurality of computing processors is disposed below a mean waterline of the buoyant computing apparatus. 35. The wind-powered marine task processors of claim 31, further comprising a propulsion system mounted on the buoyant structure for moving the buoyant computing apparatus on a body of water. 36. The wind-powered marine task processor of claim 31, wherein the plurality of computing processors includes application-specific integrated circuits adapted for calculating cryptographic hash values for producing valid blockchain blocks. 37. The wind-powered marine task processor of claim 31, wherein the plurality of computing processors includes application-specific integrated circuits adapted for training a neural network. 38. The wind-powered marine task processor of claim 31, wherein the plurality of computing processors includes application-specific integrated circuits adapted for performing inference using a neural network. 39. The wind-powered marine task processor of claim 31, wherein the plurality of computing processors is configured for brain simulation. 40. The wind-powered marine task processor of claim 31, further comprising a compartment mounted on the buoyant structure and housing an immersion liquid having boiling point lower than that of water, and wherein the plurality of computing processors warms the immersion liquid to dissipate heat. 41. The wind-powered marine task processor of claim 31, further comprising an activation system, and wherein computing processors are turned on by the activation system in response to an increase in available electrical power. 42. The wind-powered marine task processor of claim 31, further comprising a data communication system for communicating computational task specifications to the buoyant computing apparatus. 43. The wind-powered marine task processor of claim 42, wherein the data communication system includes a phased array antenna coupled to the buoyant computing apparatus. 44. The wind-powered marine task processor of claim 42, wherein the data communication system includes a 5G antenna coupled to the buoyant computing apparatus. 45. The wind-powered marine task processor of claim 42, further comprising a data reception computer positioned upon land and a remote receiving antenna positioned upon land, and wherein the data reception computer processes computational results received from the plurality of computing processors via the remote receiving antenna. 46. The wind-powered marine task processor of claim 42, further comprising a data reception computer positioned upon land and a remote receiving antenna positioned upon land, and wherein the data reception computer relays to a computer network computational results received from the plurality of computing processors via the remote receiving antenna. 47. The wind-powered marine task processor of claim 42, further comprising a submerged heat exchanger for dissipating heat from the plurality of computing processors to a body of water. 48. The wind-powered marine task processor of claim 42, further comprising a heat exchanger disposed above a mean waterline of the buoyant computing apparatus for dissipating heat from the plurality of computing processors to the atmosphere. 49. The wind-powered marine task processor of claim 42, wherein the power-take-off includes a battery. 50. The wind-powered marine task processor of claim 42, further comprising a task administrator computer positioned upon land and a remote transmission antenna positioned upon land, and wherein the task administrator computer operates with the remote transmission antenna to transmit computational task specifications to the plurality of computing processors via the remote transmission antenna. 51. The wind-powered marine task processor of claim 42, wherein the plurality of computing processors is configured to produce a computational result selected from the group consisting of a parameter of a neural network, a parameter of a machine learning model, a parameter of an artificially intelligent system, a cryptocurrency hash value, and a mathematical model parameter consistent with a set of data values. 52. The wind-powered marine task processor of claim 42, wherein the plurality of computing processors includes at least 50 processing units selected from the group consisting of central processing units (CPUs), graphics processing units (GPUs), tensor processing units (TPUs), application-specific integrated circuits (ASICs), and quantum processing units (QPUs). 53. The wind-powered marine task processor of claim 42, wherein at least 50% of the electrical power generated by the power-take-off is consumed by the plurality of computing processors. 54. The wind-powered marine task processor of claim 42, further comprising a submerged electrical cable and connector adapted for coupling with a submerged vessel. 55. The wind-powered marine task processor of claim 42, further comprising a submerged data transmission cable and connector adapted for coupling with a submerged vessel. 56. The wind-powered marine task processor of claim 42, further comprising a local data reception antenna mounted to the buoyant structure, and wherein the buoyant computing apparatus is configured to receive electromagnetically encoded computational task specifications via the local data reception antenna. 57. The wind-powered marine task processor of claim 42, wherein the buoyant structure is a spar buoy. 58. The wind-powered marine task processor of claim 57, wherein the buoyant computing apparatus is adapted to float with a draft at least five times greater than a widest submerged width of the buoyant structure. 59. A buoyant computing apparatus, comprising: a buoyant member; a wind-to-electrical-energy converter mounted on the buoyant member; a computing device powered by the wind-to-electrical-energy converter for generating status information of the buoyant computing apparatus and communicating status information of the buoyant computing apparatus to a remote receiver; and a plurality of computing processors mounted on the buoyant member, said plurality of computing circuits energized by the wind-to-electrical-energy converter and configured to perform computational processing unrelated to generating and communicating status information of the buoyant computing apparatus. 60. The buoyant computing apparatus of claim 59, wherein the plurality of computing processors is configured to derive a computational result selected from the group consisting of a parameter of a neural network, a parameter of a machine learning model, a parameter of an artificially intelligent system, an inference output of a neural network, an inference output of a machine learning model, and inference output of an artificially intelligent system, a cryptocurrency hash value, and a mathematical model consistent with a set of data values.
2,400
344,436
16,803,782
2,473
The present disclosure provides methods for determining the ploidy status of a chromosome in a gestating fetus from genotypic data measured from a mixed sample of DNA comprising DNA from both the mother of the fetus and from the fetus, and optionally from genotypic data from the mother and father. The ploidy state is determined by using a joint distribution model to create a plurality of expected allele distributions for different possible fetal ploidy states given the parental genotypic data, and comparing the expected allelic distributions to the pattern of measured allelic distributions measured in the mixed sample, and choosing the ploidy state whose expected allelic distribution pattern most closely matches the observed allelic distribution pattern. The mixed sample of DNA may be preferentially enriched at a plurality of polymorphic loci in a way that minimizes the allelic bias, for example using massively multiplexed targeted PCR.
1. A method for determining the fraction of fetal cell-free DNA in a maternal blood sample from a pregnant mother of a fetus without prior knowledge of parental genotypes, comprising: a) isolating DNA from the maternal blood sample, wherein the DNA comprises fetal and maternal cell-free DNA; b) performing multiplex PCR to amplify target loci that comprise at least 1,000 polymorphic loci from the cell-free DNA in one reaction mixture, wherein the multiplex PCR is performed with primers designed to reduce primer dimer formation, and further performing universal PCR to amplify products of the multiplex PCR to obtain amplification products, wherein a sample barcode and a sequencing-compatible adaptor are attached to the amplified DNA during the multiplex PCR or the universal PCR; c) measuring an amount of the target loci by performing next-generation sequencing on the amplification products of step b), wherein the measurement is performed without prior knowledge of parental genotypes; and d) determining the fraction of fetal cell-free DNA in the maternal blood sample using the measured amounts of target loci that comprise at least 1,000 polymorphic loci. 2. The method of claim 1, wherein the target loci comprise one or more single nucleotide polymorphisms (SNPs). 3. The method of claim 2, wherein the method further comprises determining allele ratios at the SNPs. 4. The method of claim 3, wherein determining the fraction of fetal cell-free DNA in the maternal blood sample uses the allele ratios. 5. The method of claim 1, wherein the method further comprises determining a ploidy state of a target chromosome of the fetus using the measured amounts of at least two of the target loci. 6. The method of claim 5, wherein one or more of the target loci map to chromosomes X, Y, 13, 18, and/or 21 and the method further comprises determining a ploidy state for chromosomes X, Y, 13, 18, and/or 21 using the measured amounts of the target loci. 7. The method of claim 6, wherein one or more of the target loci are from a reference chromosome. 8. The method of claim 5, wherein measuring the amounts of target loci comprises counting the number of reads that map to a given chromosome. 9. The method of claim 5, wherein the measuring provides bulk genotypic measurements of at least some of the target loci, and wherein the bulk genotypic measurements are used to determine the ploidy state of the target chromosome. 10. The method of claim 5, wherein the target loci comprise one or more single nucleotide polymorphisms (SNPs) and wherein the estimating comprises using allele calls at the SNPs. 11. The method of claim 10, wherein the measuring comprises quantitative allele measurements. 12. The method of claim 11, wherein the quantitative allele measurements are used for determining the ploidy state and for estimating the fraction of fetal cell-free DNA in the maternal blood sample. 13. The method of claim 5, wherein one or more of the target loci map to a reference chromosome. 14. The method of claim 13, wherein the target loci comprise one or more single nucleotide polymorphisms (SNPs). 15. The method of claim 14, wherein a Z-score is determined using measurements of the amounts of target loci on the target chromosome and the reference chromosome, and the Z-score is used to determine the ploidy state of the target chromosome. 16. The method of claim 1, wherein the multiplex PCR comprises amplifying at least 2,000 polymorphic loci from the cell-free DNA in one reaction mixture. 17. The method of claim 1, wherein the multiplex PCR comprises amplifying at least 5,000 polymorphic loci from the cell-free DNA in one reaction mixture.
The present disclosure provides methods for determining the ploidy status of a chromosome in a gestating fetus from genotypic data measured from a mixed sample of DNA comprising DNA from both the mother of the fetus and from the fetus, and optionally from genotypic data from the mother and father. The ploidy state is determined by using a joint distribution model to create a plurality of expected allele distributions for different possible fetal ploidy states given the parental genotypic data, and comparing the expected allelic distributions to the pattern of measured allelic distributions measured in the mixed sample, and choosing the ploidy state whose expected allelic distribution pattern most closely matches the observed allelic distribution pattern. The mixed sample of DNA may be preferentially enriched at a plurality of polymorphic loci in a way that minimizes the allelic bias, for example using massively multiplexed targeted PCR.1. A method for determining the fraction of fetal cell-free DNA in a maternal blood sample from a pregnant mother of a fetus without prior knowledge of parental genotypes, comprising: a) isolating DNA from the maternal blood sample, wherein the DNA comprises fetal and maternal cell-free DNA; b) performing multiplex PCR to amplify target loci that comprise at least 1,000 polymorphic loci from the cell-free DNA in one reaction mixture, wherein the multiplex PCR is performed with primers designed to reduce primer dimer formation, and further performing universal PCR to amplify products of the multiplex PCR to obtain amplification products, wherein a sample barcode and a sequencing-compatible adaptor are attached to the amplified DNA during the multiplex PCR or the universal PCR; c) measuring an amount of the target loci by performing next-generation sequencing on the amplification products of step b), wherein the measurement is performed without prior knowledge of parental genotypes; and d) determining the fraction of fetal cell-free DNA in the maternal blood sample using the measured amounts of target loci that comprise at least 1,000 polymorphic loci. 2. The method of claim 1, wherein the target loci comprise one or more single nucleotide polymorphisms (SNPs). 3. The method of claim 2, wherein the method further comprises determining allele ratios at the SNPs. 4. The method of claim 3, wherein determining the fraction of fetal cell-free DNA in the maternal blood sample uses the allele ratios. 5. The method of claim 1, wherein the method further comprises determining a ploidy state of a target chromosome of the fetus using the measured amounts of at least two of the target loci. 6. The method of claim 5, wherein one or more of the target loci map to chromosomes X, Y, 13, 18, and/or 21 and the method further comprises determining a ploidy state for chromosomes X, Y, 13, 18, and/or 21 using the measured amounts of the target loci. 7. The method of claim 6, wherein one or more of the target loci are from a reference chromosome. 8. The method of claim 5, wherein measuring the amounts of target loci comprises counting the number of reads that map to a given chromosome. 9. The method of claim 5, wherein the measuring provides bulk genotypic measurements of at least some of the target loci, and wherein the bulk genotypic measurements are used to determine the ploidy state of the target chromosome. 10. The method of claim 5, wherein the target loci comprise one or more single nucleotide polymorphisms (SNPs) and wherein the estimating comprises using allele calls at the SNPs. 11. The method of claim 10, wherein the measuring comprises quantitative allele measurements. 12. The method of claim 11, wherein the quantitative allele measurements are used for determining the ploidy state and for estimating the fraction of fetal cell-free DNA in the maternal blood sample. 13. The method of claim 5, wherein one or more of the target loci map to a reference chromosome. 14. The method of claim 13, wherein the target loci comprise one or more single nucleotide polymorphisms (SNPs). 15. The method of claim 14, wherein a Z-score is determined using measurements of the amounts of target loci on the target chromosome and the reference chromosome, and the Z-score is used to determine the ploidy state of the target chromosome. 16. The method of claim 1, wherein the multiplex PCR comprises amplifying at least 2,000 polymorphic loci from the cell-free DNA in one reaction mixture. 17. The method of claim 1, wherein the multiplex PCR comprises amplifying at least 5,000 polymorphic loci from the cell-free DNA in one reaction mixture.
2,400
344,437
16,803,857
2,473
A carrier selection method and a communications device includes obtaining channel busy ratios (CBR) of a plurality of candidate carriers. The method also includes performing filtering processing on the CBRs of the plurality of candidate carriers to obtain CBRs of the plurality of candidate carriers after filtering. The method also includes selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers that are obtained after filtering. Therefore, filtering processing is performed on a measurement result of the CBRs of the plurality of candidate carriers, and the carrier is selected from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers that are obtained after filtering processing, thereby reducing carrier switching frequency and ensuring system stability while the carrier is selected.
1. A carrier selection method comprising: obtaining channel busy ratios (CBRs) of a plurality of candidate carriers; and when a value of a resource reselection counter C_resel is equal to 0, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 2. The method according to claim 1 wherein: each of the plurality of candidate carriers is configured with a corresponding C_resel; and wherein selecting, when a value of a C_resel is equal to 0, a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises: when a value of a C_resel that corresponds to a carrier used in current data transmission and that is in a plurality of C_resel configured for the plurality of candidate carriers is equal to 0, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 3. The method according to claim 1 further comprising: when a value of a C_resel is equal to 0, determining whether a CBR of a first carrier exceeds a third threshold, wherein the first carrier is a carrier used in current data transmission; and selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises, if the CBR of the first carrier exceeds the third threshold, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 4. The method according to claim 3 wherein the plurality of candidate carriers comprise the first carrier. 5. The method according to claim 1 wherein selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises selecting a carrier having a smallest CBR as a to-be-used carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 6. The method according to claim 1 wherein the method is performed by a terminal device, and obtaining CBRs of the plurality of candidate carriers comprises measuring, by the terminal device, the CBRs of the plurality of candidate carriers, to obtain the CBRs of the plurality of candidate carriers. 7. The method according to claim 6 wherein a CBR of each of the plurality of candidate carriers is a CBR of a resource pool used by the terminal device on the carrier. 8. The method according to claim 7 wherein the resource pool used by the terminal device on the carrier is a resource pool that corresponds to a zone of a terminal and that is in a plurality of resource pools, and there are correspondences between the plurality of resource pools and a plurality of zones. 9. A communications device, wherein the communications device comprises: an obtaining unit configured to obtain channel busy ratios (CBRs) of a plurality of candidate carriers; and a carrier selection unit configured to: when a value of a resource reselection counter C_resel is equal to 0, select a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers obtained by the obtaining unit. 10. The communications device of claim 9 wherein each of the plurality of candidate carriers is configured with a corresponding C_resel; and wherein selecting, when a value of a C_resel is equal to 0, a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises: when a value of a C_resel that corresponds to a carrier used in current data transmission and that is in a plurality of C_resel configured for the plurality of candidate carriers is equal to 0, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 11. The communications device of claim 9 further comprising: a determining unit configured to determine whether a CBR of a first carrier exceeds a third threshold when a value of a C_resel is equal to 0, wherein the first carrier is a carrier used in current data transmission; and wherein the carrier selection unit is further configured to select a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises, if the CBR of the first carrier exceeds the third threshold, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 12. The communications device of claim 11 wherein: the determining unit is further configured to determine, when a value of a C_resel is equal to 0, whether a CBR of a first carrier exceeds a third threshold, wherein the first carrier is a carrier used in current data transmission; and the carrier selection unit is further configured to, if the CBR of the first carrier exceeds the third threshold, select a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 13. A computer-readable storage medium storing computer-executable instructions that, when executed by a computer system, configure the computer system to perform operations comprising: obtaining channel busy ratios (CBRs) of a plurality of candidate carriers; and when a value of a resource reselection counter C_resel is equal to 0, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 14. The computer-readable storage medium of claim 13 wherein: each of the plurality of candidate carriers is configured with a corresponding C_resel; and selecting, when a value of a C_resel is equal to 0, a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises: when a value of a C_resel that corresponds to a carrier used in a current data transmission and that is in a plurality of C_resel configured for the plurality of candidate carriers is equal to 0, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 15. The computer-readable storage medium of claim 13 the operations further comprising: when a value of a C_resel is equal to 0, determining whether a CBR of a first carrier exceeds a third threshold, wherein the first carrier is a carrier used in current data transmission; and selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises, if the CBR of the first carrier exceeds the third threshold, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 16. The computer-readable storage medium of claim 15 wherein the plurality of candidate carriers comprise the first carrier. 17. The computer-readable storage medium of claim 13 wherein selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises selecting a carrier having a smallest CBR as a to-be-used carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 18. The computer-readable storage medium of claim 13 wherein the operations are performed by a terminal device, and obtaining CBRs of the plurality of candidate carriers comprises measuring, by the terminal device, the CBRs of the plurality of candidate carriers, to obtain the CBRs of the plurality of candidate carriers. 19. The computer-readable storage medium of claim 18 wherein a CBR of each of the plurality of candidate carriers is a CBR of a resource pool used by the terminal device on the carrier. 20. The computer-readable storage medium of claim 19 wherein the resource pool used by the terminal device on the carrier is a resource pool that corresponds to a zone of a terminal and that is in a plurality of resource pools, and there are correspondences between the plurality of resource pools and a plurality of zones.
A carrier selection method and a communications device includes obtaining channel busy ratios (CBR) of a plurality of candidate carriers. The method also includes performing filtering processing on the CBRs of the plurality of candidate carriers to obtain CBRs of the plurality of candidate carriers after filtering. The method also includes selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers that are obtained after filtering. Therefore, filtering processing is performed on a measurement result of the CBRs of the plurality of candidate carriers, and the carrier is selected from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers that are obtained after filtering processing, thereby reducing carrier switching frequency and ensuring system stability while the carrier is selected.1. A carrier selection method comprising: obtaining channel busy ratios (CBRs) of a plurality of candidate carriers; and when a value of a resource reselection counter C_resel is equal to 0, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 2. The method according to claim 1 wherein: each of the plurality of candidate carriers is configured with a corresponding C_resel; and wherein selecting, when a value of a C_resel is equal to 0, a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises: when a value of a C_resel that corresponds to a carrier used in current data transmission and that is in a plurality of C_resel configured for the plurality of candidate carriers is equal to 0, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 3. The method according to claim 1 further comprising: when a value of a C_resel is equal to 0, determining whether a CBR of a first carrier exceeds a third threshold, wherein the first carrier is a carrier used in current data transmission; and selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises, if the CBR of the first carrier exceeds the third threshold, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 4. The method according to claim 3 wherein the plurality of candidate carriers comprise the first carrier. 5. The method according to claim 1 wherein selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises selecting a carrier having a smallest CBR as a to-be-used carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 6. The method according to claim 1 wherein the method is performed by a terminal device, and obtaining CBRs of the plurality of candidate carriers comprises measuring, by the terminal device, the CBRs of the plurality of candidate carriers, to obtain the CBRs of the plurality of candidate carriers. 7. The method according to claim 6 wherein a CBR of each of the plurality of candidate carriers is a CBR of a resource pool used by the terminal device on the carrier. 8. The method according to claim 7 wherein the resource pool used by the terminal device on the carrier is a resource pool that corresponds to a zone of a terminal and that is in a plurality of resource pools, and there are correspondences between the plurality of resource pools and a plurality of zones. 9. A communications device, wherein the communications device comprises: an obtaining unit configured to obtain channel busy ratios (CBRs) of a plurality of candidate carriers; and a carrier selection unit configured to: when a value of a resource reselection counter C_resel is equal to 0, select a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers obtained by the obtaining unit. 10. The communications device of claim 9 wherein each of the plurality of candidate carriers is configured with a corresponding C_resel; and wherein selecting, when a value of a C_resel is equal to 0, a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises: when a value of a C_resel that corresponds to a carrier used in current data transmission and that is in a plurality of C_resel configured for the plurality of candidate carriers is equal to 0, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 11. The communications device of claim 9 further comprising: a determining unit configured to determine whether a CBR of a first carrier exceeds a third threshold when a value of a C_resel is equal to 0, wherein the first carrier is a carrier used in current data transmission; and wherein the carrier selection unit is further configured to select a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises, if the CBR of the first carrier exceeds the third threshold, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 12. The communications device of claim 11 wherein: the determining unit is further configured to determine, when a value of a C_resel is equal to 0, whether a CBR of a first carrier exceeds a third threshold, wherein the first carrier is a carrier used in current data transmission; and the carrier selection unit is further configured to, if the CBR of the first carrier exceeds the third threshold, select a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 13. A computer-readable storage medium storing computer-executable instructions that, when executed by a computer system, configure the computer system to perform operations comprising: obtaining channel busy ratios (CBRs) of a plurality of candidate carriers; and when a value of a resource reselection counter C_resel is equal to 0, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 14. The computer-readable storage medium of claim 13 wherein: each of the plurality of candidate carriers is configured with a corresponding C_resel; and selecting, when a value of a C_resel is equal to 0, a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises: when a value of a C_resel that corresponds to a carrier used in a current data transmission and that is in a plurality of C_resel configured for the plurality of candidate carriers is equal to 0, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 15. The computer-readable storage medium of claim 13 the operations further comprising: when a value of a C_resel is equal to 0, determining whether a CBR of a first carrier exceeds a third threshold, wherein the first carrier is a carrier used in current data transmission; and selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises, if the CBR of the first carrier exceeds the third threshold, selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 16. The computer-readable storage medium of claim 15 wherein the plurality of candidate carriers comprise the first carrier. 17. The computer-readable storage medium of claim 13 wherein selecting a carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers comprises selecting a carrier having a smallest CBR as a to-be-used carrier from the plurality of candidate carriers according to the CBRs of the plurality of candidate carriers. 18. The computer-readable storage medium of claim 13 wherein the operations are performed by a terminal device, and obtaining CBRs of the plurality of candidate carriers comprises measuring, by the terminal device, the CBRs of the plurality of candidate carriers, to obtain the CBRs of the plurality of candidate carriers. 19. The computer-readable storage medium of claim 18 wherein a CBR of each of the plurality of candidate carriers is a CBR of a resource pool used by the terminal device on the carrier. 20. The computer-readable storage medium of claim 19 wherein the resource pool used by the terminal device on the carrier is a resource pool that corresponds to a zone of a terminal and that is in a plurality of resource pools, and there are correspondences between the plurality of resource pools and a plurality of zones.
2,400
344,438
16,803,859
2,473
Systems and methods for analyzing complexity of surgical footage are disclosed. A system may include at least one processor configured to analyze frames of the surgical footage to identify an anatomical structure in a first set of frames. The processor may access first historical data based on an analysis of first frame data captured from a first group of surgical procedures and analyze the first set of frames to determine a first complexity level. The processor may analyze the surgical footage to identify in a second set of frames a medical tool, an anatomical structure, and an interaction between the medical tool and the anatomical structure. The processor may access second historical data based on an analysis of a second frame data captured from a second group of surgical procedures and analyze the second set of frames to determine a second complexity level associated with the second set of frames.
1-80. (canceled) 81. A computer-implemented method for analyzing complexity of surgical footage, the method comprising: analyzing frames of the surgical footage to identify in a first set of frames an anatomical structure; accessing first historical data, the first historical data being based on an analysis of first frame data captured from a first group of prior surgical procedures; analyzing the first set of frames using the first historical data and using the identified anatomical structure to determine a first surgical complexity level associated with the first set of frames; analyzing frames of the surgical footage to identify in a second set of frames a medical tool, the anatomical structure, and an interaction between the medical tool and the anatomical structure; accessing second historical data, the second historical data being based on an analysis of a second frame data captured from a second group of prior surgical procedures; and analyzing the second set of frames using the second historical data and using the identified interaction to determine a second surgical complexity level associated with the second set of frames. 82. The method of claim 81, wherein determining the first surgical complexity level further includes identifying in the first set of frames a medical tool. 83. The method of claim 81, wherein determining the second surgical complexity level is based on time elapsed from the first set of frames to the second set of frames. 84. The method of claim 81, wherein at least one of determining the first complexity level or second complexity level is based on a physiological response. 85. The method of claim 81, wherein the method further comprises determining a level of skill demonstrated by a healthcare provider in the surgical footage, and wherein at least one of determining the first complexity level or second complexity level is based on the determined level of skill demonstrated by the healthcare provider. 86. The method of claim 81, further comprising determining that the first surgical complexity level is less than a selected threshold, determining that the second surgical complexity level exceeds the selected threshold, and in response to the determination that the first surgical complexity level is less than the selected threshold and the determination that the second surgical complexity level exceeds the selected threshold, storing the second set of frames in a data structure while omitting the first set of frames from the data structure. 87. The method of claim 81, wherein identifying the anatomical structure in the first set of frames is based on an identification of a medical tool and a first interaction between the medical tool and the anatomical structure. 88. The method of claim 81, further comprising: tagging the first set of frames with the first surgical complexity level; tagging the second set of frames with the second surgical complexity level; and generating a data structure including the first set of frames with the first tag and the second set of frames with the second tag to enable a surgeon to select the second surgical complexity level, and thereby cause the second set of frames to be displayed, while omitting a display of the first set of frames. 89. The method of claim 81, further comprising using a machine learning model trained to identify surgical complexity levels using frame data captured from prior surgical procedures to determine at least one of the first surgical complexity level or the second surgical complexity level. 90. The method of claim 81, wherein determining the second surgical complexity level is based on an event that occurred between the first set of frames and the second set of frames. 91. The method of claim 81, wherein determining at least one of the first surgical complexity level or the second surgical complexity level is based on a condition of the anatomical structure. 92. The method of claim 81, wherein determining at least one of the first surgical complexity level or the second surgical complexity level is based on an analysis of an electronic medical record. 93. The method of claim 81, wherein determining the first surgical complexity level is based on an event that occurred after the first set of frames. 94. The method of claim 81, wherein determining at least one of the first surgical complexity level or the second surgical complexity level is based on a skill level of a surgeon associated with the surgical footage. 95. The method of claim 81, wherein determining the second surgical complexity level is based on an indication that an additional surgeon was called after the first set of frames. 96. The method of claim 81, wherein determining the second surgical complexity level is based on an indication that a particular medicine was administered after the first set of frames. 97. The method of claim 81, wherein the first historical data includes a machine learning model trained using the first frame data captured from the first group of prior surgical procedures. 98. The method of claim 81, wherein the first historical data includes an indication of a statistical relation between a particular anatomical structure and a particular surgical complexity level. 99. A system for analyzing complexity of surgical footage, the system comprising: at least one processor configured to: analyze frames of the surgical footage to identify in a first set of frames an anatomical structure; access first historical data, the first historical data being based on an analysis of first frame data captured from a first group of prior surgical procedures; analyze the first set of frames using the first historical data and using the identified anatomical structure to determine a first surgical complexity level associated with the first set of frames; analyze frames of the surgical footage to identify in a second set of frames a medical tool, an anatomical structure, and an interaction between the medical tool and the anatomical structure; access second historical data, the second historical data being based on an analysis of a second frame data captured from a second group of prior surgical procedures; and analyze the second set of frames using the second historical data and using the identified interaction to determine a second surgical complexity level associated with the second set of frames. 100. A non-transitory computer readable medium comprising instructions that, when executed by at least one processor, cause the at least one processor to execute operations enabling surgical video review, the operations comprising: analyzing frames of the surgical footage to identify in a first set of frames an anatomical structure; accessing first historical data, the first historical data being based on an analysis of a first frame data captured from a first group of prior surgical procedures; analyzing the first set of frames using the first historical data and using the identified anatomical structure to determine a first surgical complexity level associated with the first set of frames; analyzing frames of the surgical footage to identify in a second set of frames a medical tool, an anatomical structure, and an interaction between the medical tool and the anatomical structure; accessing second historical data, the second historical data being based on an analysis of a second frame data captured from a second group of prior surgical procedures; and analyzing the second set of frames using the second historical data based on an analysis of frame data captured from prior surgical procedures and using the identified interaction to determine a second surgical complexity level associated with the second set of frames. 101-282. (canceled)
Systems and methods for analyzing complexity of surgical footage are disclosed. A system may include at least one processor configured to analyze frames of the surgical footage to identify an anatomical structure in a first set of frames. The processor may access first historical data based on an analysis of first frame data captured from a first group of surgical procedures and analyze the first set of frames to determine a first complexity level. The processor may analyze the surgical footage to identify in a second set of frames a medical tool, an anatomical structure, and an interaction between the medical tool and the anatomical structure. The processor may access second historical data based on an analysis of a second frame data captured from a second group of surgical procedures and analyze the second set of frames to determine a second complexity level associated with the second set of frames.1-80. (canceled) 81. A computer-implemented method for analyzing complexity of surgical footage, the method comprising: analyzing frames of the surgical footage to identify in a first set of frames an anatomical structure; accessing first historical data, the first historical data being based on an analysis of first frame data captured from a first group of prior surgical procedures; analyzing the first set of frames using the first historical data and using the identified anatomical structure to determine a first surgical complexity level associated with the first set of frames; analyzing frames of the surgical footage to identify in a second set of frames a medical tool, the anatomical structure, and an interaction between the medical tool and the anatomical structure; accessing second historical data, the second historical data being based on an analysis of a second frame data captured from a second group of prior surgical procedures; and analyzing the second set of frames using the second historical data and using the identified interaction to determine a second surgical complexity level associated with the second set of frames. 82. The method of claim 81, wherein determining the first surgical complexity level further includes identifying in the first set of frames a medical tool. 83. The method of claim 81, wherein determining the second surgical complexity level is based on time elapsed from the first set of frames to the second set of frames. 84. The method of claim 81, wherein at least one of determining the first complexity level or second complexity level is based on a physiological response. 85. The method of claim 81, wherein the method further comprises determining a level of skill demonstrated by a healthcare provider in the surgical footage, and wherein at least one of determining the first complexity level or second complexity level is based on the determined level of skill demonstrated by the healthcare provider. 86. The method of claim 81, further comprising determining that the first surgical complexity level is less than a selected threshold, determining that the second surgical complexity level exceeds the selected threshold, and in response to the determination that the first surgical complexity level is less than the selected threshold and the determination that the second surgical complexity level exceeds the selected threshold, storing the second set of frames in a data structure while omitting the first set of frames from the data structure. 87. The method of claim 81, wherein identifying the anatomical structure in the first set of frames is based on an identification of a medical tool and a first interaction between the medical tool and the anatomical structure. 88. The method of claim 81, further comprising: tagging the first set of frames with the first surgical complexity level; tagging the second set of frames with the second surgical complexity level; and generating a data structure including the first set of frames with the first tag and the second set of frames with the second tag to enable a surgeon to select the second surgical complexity level, and thereby cause the second set of frames to be displayed, while omitting a display of the first set of frames. 89. The method of claim 81, further comprising using a machine learning model trained to identify surgical complexity levels using frame data captured from prior surgical procedures to determine at least one of the first surgical complexity level or the second surgical complexity level. 90. The method of claim 81, wherein determining the second surgical complexity level is based on an event that occurred between the first set of frames and the second set of frames. 91. The method of claim 81, wherein determining at least one of the first surgical complexity level or the second surgical complexity level is based on a condition of the anatomical structure. 92. The method of claim 81, wherein determining at least one of the first surgical complexity level or the second surgical complexity level is based on an analysis of an electronic medical record. 93. The method of claim 81, wherein determining the first surgical complexity level is based on an event that occurred after the first set of frames. 94. The method of claim 81, wherein determining at least one of the first surgical complexity level or the second surgical complexity level is based on a skill level of a surgeon associated with the surgical footage. 95. The method of claim 81, wherein determining the second surgical complexity level is based on an indication that an additional surgeon was called after the first set of frames. 96. The method of claim 81, wherein determining the second surgical complexity level is based on an indication that a particular medicine was administered after the first set of frames. 97. The method of claim 81, wherein the first historical data includes a machine learning model trained using the first frame data captured from the first group of prior surgical procedures. 98. The method of claim 81, wherein the first historical data includes an indication of a statistical relation between a particular anatomical structure and a particular surgical complexity level. 99. A system for analyzing complexity of surgical footage, the system comprising: at least one processor configured to: analyze frames of the surgical footage to identify in a first set of frames an anatomical structure; access first historical data, the first historical data being based on an analysis of first frame data captured from a first group of prior surgical procedures; analyze the first set of frames using the first historical data and using the identified anatomical structure to determine a first surgical complexity level associated with the first set of frames; analyze frames of the surgical footage to identify in a second set of frames a medical tool, an anatomical structure, and an interaction between the medical tool and the anatomical structure; access second historical data, the second historical data being based on an analysis of a second frame data captured from a second group of prior surgical procedures; and analyze the second set of frames using the second historical data and using the identified interaction to determine a second surgical complexity level associated with the second set of frames. 100. A non-transitory computer readable medium comprising instructions that, when executed by at least one processor, cause the at least one processor to execute operations enabling surgical video review, the operations comprising: analyzing frames of the surgical footage to identify in a first set of frames an anatomical structure; accessing first historical data, the first historical data being based on an analysis of a first frame data captured from a first group of prior surgical procedures; analyzing the first set of frames using the first historical data and using the identified anatomical structure to determine a first surgical complexity level associated with the first set of frames; analyzing frames of the surgical footage to identify in a second set of frames a medical tool, an anatomical structure, and an interaction between the medical tool and the anatomical structure; accessing second historical data, the second historical data being based on an analysis of a second frame data captured from a second group of prior surgical procedures; and analyzing the second set of frames using the second historical data based on an analysis of frame data captured from prior surgical procedures and using the identified interaction to determine a second surgical complexity level associated with the second set of frames. 101-282. (canceled)
2,400
344,439
16,803,922
2,473
A touch screen panel includes a thin film substrate having sensing patterns formed thereon that is implemented as an isotropic film, and a polarizing plate is disposed on the sensing patterns so that it is possible to minimize or reduce degradation of image quality. The touch screen panel includes a thin film substrate, sensing patterns, and sensing lines. The thin film substrate is divided into an active area and a non-active area. The sensing patterns are formed in the active area of the thin film substrate. The sensing lines are formed in the non-active area of the thin film substrate so as to be connected to the sensing patterns. In the touch screen panel, the thin film substrate is implemented as an isotropic film.
1. A display device comprising: a flexible thin film substrate having a first surface, and a second surface opposite the first surface; a sensing pattern on at least one surface of the first and second surfaces of the flexible thin film substrate; a polarizing plate over the flexible thin film substrate; a first adhesive layer interposed between the first surface of the flexible thin film substrate and the polarizing plate, over an entirety of the first surface of the flexible thin film substrate, and contacting an entirety of a surface of the polarizing plate; a flexible display device under the flexible thin film substrate; and a second adhesive layer interposed between the second surface of the flexible thin film substrate and the flexible display device, wherein the flexible thin film substrate comprises polycarbonate or cyclic polyolefin, and wherein the first adhesive layer contacts the sensing pattern on the first surface of the flexible thin film substrate and an exposed portion of the first surface of the flexible thin film substrate.
A touch screen panel includes a thin film substrate having sensing patterns formed thereon that is implemented as an isotropic film, and a polarizing plate is disposed on the sensing patterns so that it is possible to minimize or reduce degradation of image quality. The touch screen panel includes a thin film substrate, sensing patterns, and sensing lines. The thin film substrate is divided into an active area and a non-active area. The sensing patterns are formed in the active area of the thin film substrate. The sensing lines are formed in the non-active area of the thin film substrate so as to be connected to the sensing patterns. In the touch screen panel, the thin film substrate is implemented as an isotropic film.1. A display device comprising: a flexible thin film substrate having a first surface, and a second surface opposite the first surface; a sensing pattern on at least one surface of the first and second surfaces of the flexible thin film substrate; a polarizing plate over the flexible thin film substrate; a first adhesive layer interposed between the first surface of the flexible thin film substrate and the polarizing plate, over an entirety of the first surface of the flexible thin film substrate, and contacting an entirety of a surface of the polarizing plate; a flexible display device under the flexible thin film substrate; and a second adhesive layer interposed between the second surface of the flexible thin film substrate and the flexible display device, wherein the flexible thin film substrate comprises polycarbonate or cyclic polyolefin, and wherein the first adhesive layer contacts the sensing pattern on the first surface of the flexible thin film substrate and an exposed portion of the first surface of the flexible thin film substrate.
2,400
344,440
16,803,920
2,473
Multistep recovery of chunk fragments of a peer group employing hierarchical erasure coding for geographically diverse data storage protection is disclosed. A peer group of chunks can employ zone-level erasure coding of chunks that can each employ chunk-level erasure coding. In a first iteration, fragment recovery can be performed across peer group chunks based on the zone-level erasure coding. Subsequently, the first iteration can perform recovery of other fragments within a chunk based on the chunk-level erasure coding. Where additional fragments are to be recovered, subsequent iterations can be performed. The disclosed multistep recovery can enable recovery of fragments that would typically have been considered unrecoverable via conventional techniques. Additionally, multistep recovery can enable recovery of fragments across a peer group of chunks that can be more computing resource efficient than recovery of chunks across the peer group of chunks.
1. A system, comprising: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: determining, in a first iteration, a peer group of chunks stored via a geographically distributed data storage system, wherein the chunks of the peer group of chunks employ a same chunk-level erasure coding scheme, and wherein the peer group of chunks employ a zone-level erasure coding scheme; in response to selecting a ‘zone-level decoding first’ scheme, recovering a first fragment of a first chunk of the peer group of chunks by employing a second fragment of a second chunk of the peer group of chunks via a first zone-level decoding operation, wherein the second fragment corresponds to the first fragment, and recovering a third fragment of the first chunk by employing a fourth fragment of the first chunk via a first chunk-level decoding operation; and in response to selecting a ‘chunk-level decoding first’ scheme, recovering a fifth fragment of the first chunk of the peer group of chunks by employing a sixth fragment of the first chunk via a second chunk-level decoding operation, and recovering a seventh fragment of the second chunk by employing an eighth fragment of the first chunk via a second zone-level decoding operation, wherein the eighth fragment corresponds to the seventh fragment. 2. The system of claim 1, wherein the chunk-level erasure coding scheme is a 12+4 chunk-level erasure coding scheme. 3. The system of claim 1, wherein the chunk-level erasure coding scheme is a 10+2 chunk-level erasure coding scheme. 4. The system of claim 1, wherein the zone-level erasure coding scheme is a 4+2 zone-level erasure coding scheme. 5. The system of claim 1, wherein the zone-level erasure coding scheme is a different erasure coding scheme than the chunk-level erasure coding scheme. 6. The system of claim 1, wherein the zone-level erasure coding scheme is a same erasure coding scheme as the chunk-level erasure coding scheme. 7. The system of claim 1, wherein the operations further comprise performing a second iteration comprising recovering a ninth fragment of the first chunk of the peer group of chunks by employing a tenth fragment of the second chunk of the peer group of chunks via a third zone-level decoding operation, and wherein the tenth fragment corresponds to the ninth fragment. 8. The system of claim 1, wherein the operations further comprise performing a second iteration comprising recovering an eleventh fragment of the first chunk by employing a twelfth fragment of the first chunk via a second chunk-level decoding operation. 9. The system of claim 1, wherein the operations further comprise performing subsequent iterations comprising subsequent zone-level recovery of a subsequent fragment among the chunks of the peer group of chunks and subsequent chunk-level recovery of another subsequent fragment within a chunk of the peer group chunks. 10. The system of claim 9, wherein the subsequent iterations continue until all data fragments of all chunks of the peer group of chunks are recovered. 11. The system of claim 9, wherein the subsequent iterations continue until a last iteration of the subsequent iterations fails due to a count of available fragments among chunks of the peer group of chunks being insufficient to perform a last subsequent zone-level fragment recovery operation. 12. The system of claim 9, wherein the subsequent iterations continue until a last iteration of the subsequent iterations fails due to a count of available fragments within a chunk being insufficient to perform a last subsequent chunk-level fragment recovery operation. 13. A method, comprising: performing, by a system comprising a processor, a first iteration of operations comprising: in response to determining that a portion of a peer group of chunks stored in a geographically diverse data storage system has become less available, determining a type of a first iteration of a recovery process, wherein all chunks comprising the peer group of chunks employ a same chunk-level erasure coding scheme, and wherein the peer group of chunks employs a zone-level erasure coding scheme; in response to the type being a ‘zone-level decoding first’ type: recovering, by the system via a first zone-level decoding operation, a first fragment of a first chunk of the peer group of chunks based at least in part on a second fragment of a second chunk of the peer group of chunks, wherein the second fragment corresponds to the first fragment, and recovering, via a first chunk-level decoding operation, a third fragment of the first chunk based at least in part on a fourth fragment of the first chunk; and in response to determining, by the system, that an indicator satisfies a condition related to continuing operations, performing a second iteration of the operations subsequent to the first iteration. 14. The method of claim 13, wherein the first iteration of operations further comprises: in response to the type being a ‘chunk-level decoding first’ type: recovering a fifth fragment of the first chunk of the peer group of chunks by employing a sixth fragment of the first chunk via a second chunk-level decoding operation, and recovering a seventh fragment of the second chunk by employing an eighth fragment of the first chunk via a second zone-level decoding operation. 15. The method of claim 13, wherein the zone-level erasure coding scheme results in the peer group of chunks comprising kzone+mzone chunks, and wherein the zone-level erasure coding scheme is selected from a group of erasure coding schema comprising a 12+4 erasure coding scheme, a 10+2 erasure coding scheme, and a 4+2 erasure coding scheme. 16. The method of claim 13, wherein the chunk-level erasure coding scheme results in chunks comprising kchunk+mchunk fragments, and wherein the chunk-level erasure coding scheme is selected from a group of erasure coding schema comprising a 12+4 erasure coding scheme, a 10+2 erasure coding scheme, and a 4+2 erasure coding scheme. 17. The method of claim 13, wherein the determining that the indicator satisfies a condition related to continuing operations comprises: determining that all data fragments of the peer group of chunks have been recovered, determining that a subsequent iteration of the operations cannot complete because a count of available fragments is less than kzone, resulting in prevention of completing a zone-level fragment recovery operation, or determining that a subsequent iteration of the operations cannot complete because the count of available fragments is less than kchunk, resulting in prevention of a chunk-level fragment recovery operation. 18. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising: an initial iteration of operations comprising: determining a type of a first iteration of a recovery process to facilitate recovery of a portion of a peer group of chunks stored in a geographically diverse data storage system, wherein all chunks comprising the peer group of chunks employ a same chunk-level erasure coding scheme, and wherein the peer group of chunks employs a zone-level erasure coding scheme; in response to the type being a ‘zone-level decoding first’ type: recovering, via a first zone-level decoding operation, a first fragment of a first chunk of the peer group of chunks based at least in part on a second fragment of a second chunk of the peer group of chunks, wherein the second fragment corresponds to the first fragment, and recovering, via a first chunk-level decoding operation, a third fragment of the first chunk based at least in part on a fourth fragment of the first chunk; and performing a subsequent iteration of the operations after the initial iteration. 19. The machine-readable storage medium of claim 18, wherein the initial iteration of operations further comprises: in response to the type being a ‘chunk-level decoding first’ type: recovering a fifth fragment of the first chunk of the peer group of chunks by employing a sixth fragment of the first chunk via a second chunk-level decoding operation, and recovering a seventh fragment of the second chunk by employing an eighth fragment of the first chunk via a second zone-level decoding operation. 20. The machine-readable storage medium of claim 18, wherein the zone-level erasure coding scheme results in the peer group of chunks comprising kzone+mzone chunk, and wherein the chunk-level erasure coding scheme results in chunks comprising kchunk+mchunk fragments.
Multistep recovery of chunk fragments of a peer group employing hierarchical erasure coding for geographically diverse data storage protection is disclosed. A peer group of chunks can employ zone-level erasure coding of chunks that can each employ chunk-level erasure coding. In a first iteration, fragment recovery can be performed across peer group chunks based on the zone-level erasure coding. Subsequently, the first iteration can perform recovery of other fragments within a chunk based on the chunk-level erasure coding. Where additional fragments are to be recovered, subsequent iterations can be performed. The disclosed multistep recovery can enable recovery of fragments that would typically have been considered unrecoverable via conventional techniques. Additionally, multistep recovery can enable recovery of fragments across a peer group of chunks that can be more computing resource efficient than recovery of chunks across the peer group of chunks.1. A system, comprising: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: determining, in a first iteration, a peer group of chunks stored via a geographically distributed data storage system, wherein the chunks of the peer group of chunks employ a same chunk-level erasure coding scheme, and wherein the peer group of chunks employ a zone-level erasure coding scheme; in response to selecting a ‘zone-level decoding first’ scheme, recovering a first fragment of a first chunk of the peer group of chunks by employing a second fragment of a second chunk of the peer group of chunks via a first zone-level decoding operation, wherein the second fragment corresponds to the first fragment, and recovering a third fragment of the first chunk by employing a fourth fragment of the first chunk via a first chunk-level decoding operation; and in response to selecting a ‘chunk-level decoding first’ scheme, recovering a fifth fragment of the first chunk of the peer group of chunks by employing a sixth fragment of the first chunk via a second chunk-level decoding operation, and recovering a seventh fragment of the second chunk by employing an eighth fragment of the first chunk via a second zone-level decoding operation, wherein the eighth fragment corresponds to the seventh fragment. 2. The system of claim 1, wherein the chunk-level erasure coding scheme is a 12+4 chunk-level erasure coding scheme. 3. The system of claim 1, wherein the chunk-level erasure coding scheme is a 10+2 chunk-level erasure coding scheme. 4. The system of claim 1, wherein the zone-level erasure coding scheme is a 4+2 zone-level erasure coding scheme. 5. The system of claim 1, wherein the zone-level erasure coding scheme is a different erasure coding scheme than the chunk-level erasure coding scheme. 6. The system of claim 1, wherein the zone-level erasure coding scheme is a same erasure coding scheme as the chunk-level erasure coding scheme. 7. The system of claim 1, wherein the operations further comprise performing a second iteration comprising recovering a ninth fragment of the first chunk of the peer group of chunks by employing a tenth fragment of the second chunk of the peer group of chunks via a third zone-level decoding operation, and wherein the tenth fragment corresponds to the ninth fragment. 8. The system of claim 1, wherein the operations further comprise performing a second iteration comprising recovering an eleventh fragment of the first chunk by employing a twelfth fragment of the first chunk via a second chunk-level decoding operation. 9. The system of claim 1, wherein the operations further comprise performing subsequent iterations comprising subsequent zone-level recovery of a subsequent fragment among the chunks of the peer group of chunks and subsequent chunk-level recovery of another subsequent fragment within a chunk of the peer group chunks. 10. The system of claim 9, wherein the subsequent iterations continue until all data fragments of all chunks of the peer group of chunks are recovered. 11. The system of claim 9, wherein the subsequent iterations continue until a last iteration of the subsequent iterations fails due to a count of available fragments among chunks of the peer group of chunks being insufficient to perform a last subsequent zone-level fragment recovery operation. 12. The system of claim 9, wherein the subsequent iterations continue until a last iteration of the subsequent iterations fails due to a count of available fragments within a chunk being insufficient to perform a last subsequent chunk-level fragment recovery operation. 13. A method, comprising: performing, by a system comprising a processor, a first iteration of operations comprising: in response to determining that a portion of a peer group of chunks stored in a geographically diverse data storage system has become less available, determining a type of a first iteration of a recovery process, wherein all chunks comprising the peer group of chunks employ a same chunk-level erasure coding scheme, and wherein the peer group of chunks employs a zone-level erasure coding scheme; in response to the type being a ‘zone-level decoding first’ type: recovering, by the system via a first zone-level decoding operation, a first fragment of a first chunk of the peer group of chunks based at least in part on a second fragment of a second chunk of the peer group of chunks, wherein the second fragment corresponds to the first fragment, and recovering, via a first chunk-level decoding operation, a third fragment of the first chunk based at least in part on a fourth fragment of the first chunk; and in response to determining, by the system, that an indicator satisfies a condition related to continuing operations, performing a second iteration of the operations subsequent to the first iteration. 14. The method of claim 13, wherein the first iteration of operations further comprises: in response to the type being a ‘chunk-level decoding first’ type: recovering a fifth fragment of the first chunk of the peer group of chunks by employing a sixth fragment of the first chunk via a second chunk-level decoding operation, and recovering a seventh fragment of the second chunk by employing an eighth fragment of the first chunk via a second zone-level decoding operation. 15. The method of claim 13, wherein the zone-level erasure coding scheme results in the peer group of chunks comprising kzone+mzone chunks, and wherein the zone-level erasure coding scheme is selected from a group of erasure coding schema comprising a 12+4 erasure coding scheme, a 10+2 erasure coding scheme, and a 4+2 erasure coding scheme. 16. The method of claim 13, wherein the chunk-level erasure coding scheme results in chunks comprising kchunk+mchunk fragments, and wherein the chunk-level erasure coding scheme is selected from a group of erasure coding schema comprising a 12+4 erasure coding scheme, a 10+2 erasure coding scheme, and a 4+2 erasure coding scheme. 17. The method of claim 13, wherein the determining that the indicator satisfies a condition related to continuing operations comprises: determining that all data fragments of the peer group of chunks have been recovered, determining that a subsequent iteration of the operations cannot complete because a count of available fragments is less than kzone, resulting in prevention of completing a zone-level fragment recovery operation, or determining that a subsequent iteration of the operations cannot complete because the count of available fragments is less than kchunk, resulting in prevention of a chunk-level fragment recovery operation. 18. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising: an initial iteration of operations comprising: determining a type of a first iteration of a recovery process to facilitate recovery of a portion of a peer group of chunks stored in a geographically diverse data storage system, wherein all chunks comprising the peer group of chunks employ a same chunk-level erasure coding scheme, and wherein the peer group of chunks employs a zone-level erasure coding scheme; in response to the type being a ‘zone-level decoding first’ type: recovering, via a first zone-level decoding operation, a first fragment of a first chunk of the peer group of chunks based at least in part on a second fragment of a second chunk of the peer group of chunks, wherein the second fragment corresponds to the first fragment, and recovering, via a first chunk-level decoding operation, a third fragment of the first chunk based at least in part on a fourth fragment of the first chunk; and performing a subsequent iteration of the operations after the initial iteration. 19. The machine-readable storage medium of claim 18, wherein the initial iteration of operations further comprises: in response to the type being a ‘chunk-level decoding first’ type: recovering a fifth fragment of the first chunk of the peer group of chunks by employing a sixth fragment of the first chunk via a second chunk-level decoding operation, and recovering a seventh fragment of the second chunk by employing an eighth fragment of the first chunk via a second zone-level decoding operation. 20. The machine-readable storage medium of claim 18, wherein the zone-level erasure coding scheme results in the peer group of chunks comprising kzone+mzone chunk, and wherein the chunk-level erasure coding scheme results in chunks comprising kchunk+mchunk fragments.
2,400
344,441
16,803,913
2,473
Log-based storage space management related to data convolution in a geographically diverse data storage system is disclosed. Data chunks stored in storage devices of different zones of a zone storage system can be convolved to conserve computing resources. Deletion of a chunk from a first zone can be coupled to generating another chunk in another zone to preserve the integrity of a redundant data protection scheme. In response to determining that a first chunk is to be deleted, a log can be generated that can indicate the first chunk is available to be deleted and can indicate other affected chunks. In an aspect, the other affected chunks can comprise a convolved chunk that can convolve the first chunk and at least a second chunk. Accordingly a third chunk can be generated to facilitate deletion of the first chunk while preserving protection of information in the second chunk. Generation of the third chunk can be deferred until a threshold condition is determined to be satisfied.
1. A system, comprising: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: in response to determining that a first chunk is to be deleted from a first zone storage component of a geographically distributed storage system, logging an indicator corresponding to the first chunk; in response to determining that a second chunk convolves first information represented in the first chunk, logging a second indicator corresponding to the second chunk, wherein the second chunk is stored via a second zone storage component of the geographically distributed storage system, and wherein the second chunk provides redundancy of the data of the first chunk; and in response to generating a third data chunk based on at least the first indicator and the second indicator, wherein the third chunk represents other information of chunks convolved in the second chunk and excludes representation of the first information of the first chunk, deleting the first chunk and the second chunk. 2. The system of claim 1, wherein the generating the third data chunk is deferred until a condition of the geographically distributed storage system is determined to satisfy a rule related to triggering deletion of the first chunk. 3. The system of claim 2, wherein the rule relates to a threshold count of other chunks to be deleted being logged in the geographically distributed storage system. 4. The system of claim 3, wherein the second chunk convolves other information represented in the other chunks to be deleted. 5. The system of claim 2, wherein the rule is a temporal rule relating to a selectable elapsed time after the determining that the first chunk is to be deleted. 6. The system of claim 2, wherein the rule is a computing resource rule relating to a selectable processor availability threshold. 7. The system of claim 2, wherein the rule is a computing resource rule relating to a selectable remaining storage threshold of the first zone storage component. 8. The system of claim 2, wherein the rule is a computing resource rule relating to a selectable remaining storage threshold of the second zone storage component. 9. The system of claim 1, wherein the generating the third chunk comprises reducing a level of convolution of the second chunk based on the second chunk, the first chunk, the second indicator, and the first indicator. 10. The system of claim 1, wherein the second chunk comprises convolution of information of the first chunk and information of a fourth chunk, wherein the fourth chunk is stored via a third zone storage component of the geographically distributed storage system. 11. The system of claim 10, wherein the generating the third chunk comprises replicating the fourth chunk. 12. The system of claim 10, wherein the generating the third chunk does not comprise replicating the first chunk and does not comprise deconvolution of the second chunk based on the first chunk. 13. A method, comprising: determining, by a system comprising a processor, that a first chunk is to be deleted from a first zone storage component of a geographically distributed storage system; determining, by the system, that a second chunk convolves information represented in the first chunk and at least a third chunk, wherein the second chunk is stored via a second zone storage component of the geographically distributed storage system, wherein at least the third chunk is stored via at least a third zone storage component of the geographically distributed storage system, and wherein the second chunk provides redundancy for the first chunk and redundancy for at least the third chunk; generating, by the system, a first record indicating the first chunk is available to be deleted and a second record indicating that the second chunk convolves information of the first chunk that is available to be deleted with information of the third chunk; in response to determining, by the system, that a deferral condition is satisfied, determining a fourth chunk based on at least the first record and the second record; and deleting, by the system, the first chunk and the second chunk. 14. The method of claim 11, wherein the determining that the deferral condition is satisfied comprises determining that a parameter of the geographically distributed storage system has transitioned a selectable threshold value. 15. The method of claim 11, wherein the determining the fourth chunk comprises replicating the first chunk and deconvolving the second chunk based on the replicate of the first chunk. 16. The method of claim 11, wherein the determining the fourth chunk comprises replicating at least the third chunk but does not comprise deconvolving the second chunk based on a replicate of the first chunk. 17. The method of claim 11, wherein the determining the fourth chunk comprises determining a null chunk. 18. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising: determining that a first chunk is to be deleted from a first zone storage component of a geographically distributed storage system, wherein the first chunk is related to a second chunk via the second chunk convolving information represented in the first chunk and at least a third chunk, wherein the second chunk is stored via a second zone storage component of the geographically distributed storage system, wherein at least the third chunk is stored via at least a third zone storage component of the geographically distributed storage system, and wherein the second chunk provides redundancy for the first chunk and redundancy for at least the third chunk; logging a first record indicating the first chunk is available to be deleted and a second record indicating that the second chunk convolves information of the first chunk with information of at least the third chunk and that the first chunk is available to be deleted; in response to determining that a deferral condition is satisfied, generating a fourth chunk that redundantly protects at least the third chunk and is based on the first record and the second record; and deleting the first chunk and the second chunk. 19. The machine-readable storage medium of claim 18, wherein the deferral condition is satisfied by a parameter of the geographically distributed storage system transitioning a selectable threshold value. 20. The machine-readable storage medium of claim 18, wherein: the determining the fourth chunk comprises replicating the first chunk and deconvolving the second chunk based on the replicate of the first chunk, or the determining the fourth chunk comprises replicating at least the third chunk but does not comprise deconvolving the second chunk based on a replicate of the first chunk.
Log-based storage space management related to data convolution in a geographically diverse data storage system is disclosed. Data chunks stored in storage devices of different zones of a zone storage system can be convolved to conserve computing resources. Deletion of a chunk from a first zone can be coupled to generating another chunk in another zone to preserve the integrity of a redundant data protection scheme. In response to determining that a first chunk is to be deleted, a log can be generated that can indicate the first chunk is available to be deleted and can indicate other affected chunks. In an aspect, the other affected chunks can comprise a convolved chunk that can convolve the first chunk and at least a second chunk. Accordingly a third chunk can be generated to facilitate deletion of the first chunk while preserving protection of information in the second chunk. Generation of the third chunk can be deferred until a threshold condition is determined to be satisfied.1. A system, comprising: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: in response to determining that a first chunk is to be deleted from a first zone storage component of a geographically distributed storage system, logging an indicator corresponding to the first chunk; in response to determining that a second chunk convolves first information represented in the first chunk, logging a second indicator corresponding to the second chunk, wherein the second chunk is stored via a second zone storage component of the geographically distributed storage system, and wherein the second chunk provides redundancy of the data of the first chunk; and in response to generating a third data chunk based on at least the first indicator and the second indicator, wherein the third chunk represents other information of chunks convolved in the second chunk and excludes representation of the first information of the first chunk, deleting the first chunk and the second chunk. 2. The system of claim 1, wherein the generating the third data chunk is deferred until a condition of the geographically distributed storage system is determined to satisfy a rule related to triggering deletion of the first chunk. 3. The system of claim 2, wherein the rule relates to a threshold count of other chunks to be deleted being logged in the geographically distributed storage system. 4. The system of claim 3, wherein the second chunk convolves other information represented in the other chunks to be deleted. 5. The system of claim 2, wherein the rule is a temporal rule relating to a selectable elapsed time after the determining that the first chunk is to be deleted. 6. The system of claim 2, wherein the rule is a computing resource rule relating to a selectable processor availability threshold. 7. The system of claim 2, wherein the rule is a computing resource rule relating to a selectable remaining storage threshold of the first zone storage component. 8. The system of claim 2, wherein the rule is a computing resource rule relating to a selectable remaining storage threshold of the second zone storage component. 9. The system of claim 1, wherein the generating the third chunk comprises reducing a level of convolution of the second chunk based on the second chunk, the first chunk, the second indicator, and the first indicator. 10. The system of claim 1, wherein the second chunk comprises convolution of information of the first chunk and information of a fourth chunk, wherein the fourth chunk is stored via a third zone storage component of the geographically distributed storage system. 11. The system of claim 10, wherein the generating the third chunk comprises replicating the fourth chunk. 12. The system of claim 10, wherein the generating the third chunk does not comprise replicating the first chunk and does not comprise deconvolution of the second chunk based on the first chunk. 13. A method, comprising: determining, by a system comprising a processor, that a first chunk is to be deleted from a first zone storage component of a geographically distributed storage system; determining, by the system, that a second chunk convolves information represented in the first chunk and at least a third chunk, wherein the second chunk is stored via a second zone storage component of the geographically distributed storage system, wherein at least the third chunk is stored via at least a third zone storage component of the geographically distributed storage system, and wherein the second chunk provides redundancy for the first chunk and redundancy for at least the third chunk; generating, by the system, a first record indicating the first chunk is available to be deleted and a second record indicating that the second chunk convolves information of the first chunk that is available to be deleted with information of the third chunk; in response to determining, by the system, that a deferral condition is satisfied, determining a fourth chunk based on at least the first record and the second record; and deleting, by the system, the first chunk and the second chunk. 14. The method of claim 11, wherein the determining that the deferral condition is satisfied comprises determining that a parameter of the geographically distributed storage system has transitioned a selectable threshold value. 15. The method of claim 11, wherein the determining the fourth chunk comprises replicating the first chunk and deconvolving the second chunk based on the replicate of the first chunk. 16. The method of claim 11, wherein the determining the fourth chunk comprises replicating at least the third chunk but does not comprise deconvolving the second chunk based on a replicate of the first chunk. 17. The method of claim 11, wherein the determining the fourth chunk comprises determining a null chunk. 18. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising: determining that a first chunk is to be deleted from a first zone storage component of a geographically distributed storage system, wherein the first chunk is related to a second chunk via the second chunk convolving information represented in the first chunk and at least a third chunk, wherein the second chunk is stored via a second zone storage component of the geographically distributed storage system, wherein at least the third chunk is stored via at least a third zone storage component of the geographically distributed storage system, and wherein the second chunk provides redundancy for the first chunk and redundancy for at least the third chunk; logging a first record indicating the first chunk is available to be deleted and a second record indicating that the second chunk convolves information of the first chunk with information of at least the third chunk and that the first chunk is available to be deleted; in response to determining that a deferral condition is satisfied, generating a fourth chunk that redundantly protects at least the third chunk and is based on the first record and the second record; and deleting the first chunk and the second chunk. 19. The machine-readable storage medium of claim 18, wherein the deferral condition is satisfied by a parameter of the geographically distributed storage system transitioning a selectable threshold value. 20. The machine-readable storage medium of claim 18, wherein: the determining the fourth chunk comprises replicating the first chunk and deconvolving the second chunk based on the replicate of the first chunk, or the determining the fourth chunk comprises replicating at least the third chunk but does not comprise deconvolving the second chunk based on a replicate of the first chunk.
2,400
344,442
16,803,966
2,684
Log-based storage space management related to data convolution in a geographically diverse data storage system is disclosed. Data chunks stored in storage devices of different zones of a zone storage system can be convolved to conserve computing resources. Deletion of a chunk from a first zone can be coupled to generating another chunk in another zone to preserve the integrity of a redundant data protection scheme. In response to determining that a first chunk is to be deleted, a log can be generated that can indicate the first chunk is available to be deleted and can indicate other affected chunks. In an aspect, the other affected chunks can comprise a convolved chunk that can convolve the first chunk and at least a second chunk. Accordingly a third chunk can be generated to facilitate deletion of the first chunk while preserving protection of information in the second chunk. Generation of the third chunk can be deferred until a threshold condition is determined to be satisfied.
1. A system, comprising: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: in response to determining that a first chunk is to be deleted from a first zone storage component of a geographically distributed storage system, logging an indicator corresponding to the first chunk; in response to determining that a second chunk convolves first information represented in the first chunk, logging a second indicator corresponding to the second chunk, wherein the second chunk is stored via a second zone storage component of the geographically distributed storage system, and wherein the second chunk provides redundancy of the data of the first chunk; and in response to generating a third data chunk based on at least the first indicator and the second indicator, wherein the third chunk represents other information of chunks convolved in the second chunk and excludes representation of the first information of the first chunk, deleting the first chunk and the second chunk. 2. The system of claim 1, wherein the generating the third data chunk is deferred until a condition of the geographically distributed storage system is determined to satisfy a rule related to triggering deletion of the first chunk. 3. The system of claim 2, wherein the rule relates to a threshold count of other chunks to be deleted being logged in the geographically distributed storage system. 4. The system of claim 3, wherein the second chunk convolves other information represented in the other chunks to be deleted. 5. The system of claim 2, wherein the rule is a temporal rule relating to a selectable elapsed time after the determining that the first chunk is to be deleted. 6. The system of claim 2, wherein the rule is a computing resource rule relating to a selectable processor availability threshold. 7. The system of claim 2, wherein the rule is a computing resource rule relating to a selectable remaining storage threshold of the first zone storage component. 8. The system of claim 2, wherein the rule is a computing resource rule relating to a selectable remaining storage threshold of the second zone storage component. 9. The system of claim 1, wherein the generating the third chunk comprises reducing a level of convolution of the second chunk based on the second chunk, the first chunk, the second indicator, and the first indicator. 10. The system of claim 1, wherein the second chunk comprises convolution of information of the first chunk and information of a fourth chunk, wherein the fourth chunk is stored via a third zone storage component of the geographically distributed storage system. 11. The system of claim 10, wherein the generating the third chunk comprises replicating the fourth chunk. 12. The system of claim 10, wherein the generating the third chunk does not comprise replicating the first chunk and does not comprise deconvolution of the second chunk based on the first chunk. 13. A method, comprising: determining, by a system comprising a processor, that a first chunk is to be deleted from a first zone storage component of a geographically distributed storage system; determining, by the system, that a second chunk convolves information represented in the first chunk and at least a third chunk, wherein the second chunk is stored via a second zone storage component of the geographically distributed storage system, wherein at least the third chunk is stored via at least a third zone storage component of the geographically distributed storage system, and wherein the second chunk provides redundancy for the first chunk and redundancy for at least the third chunk; generating, by the system, a first record indicating the first chunk is available to be deleted and a second record indicating that the second chunk convolves information of the first chunk that is available to be deleted with information of the third chunk; in response to determining, by the system, that a deferral condition is satisfied, determining a fourth chunk based on at least the first record and the second record; and deleting, by the system, the first chunk and the second chunk. 14. The method of claim 11, wherein the determining that the deferral condition is satisfied comprises determining that a parameter of the geographically distributed storage system has transitioned a selectable threshold value. 15. The method of claim 11, wherein the determining the fourth chunk comprises replicating the first chunk and deconvolving the second chunk based on the replicate of the first chunk. 16. The method of claim 11, wherein the determining the fourth chunk comprises replicating at least the third chunk but does not comprise deconvolving the second chunk based on a replicate of the first chunk. 17. The method of claim 11, wherein the determining the fourth chunk comprises determining a null chunk. 18. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising: determining that a first chunk is to be deleted from a first zone storage component of a geographically distributed storage system, wherein the first chunk is related to a second chunk via the second chunk convolving information represented in the first chunk and at least a third chunk, wherein the second chunk is stored via a second zone storage component of the geographically distributed storage system, wherein at least the third chunk is stored via at least a third zone storage component of the geographically distributed storage system, and wherein the second chunk provides redundancy for the first chunk and redundancy for at least the third chunk; logging a first record indicating the first chunk is available to be deleted and a second record indicating that the second chunk convolves information of the first chunk with information of at least the third chunk and that the first chunk is available to be deleted; in response to determining that a deferral condition is satisfied, generating a fourth chunk that redundantly protects at least the third chunk and is based on the first record and the second record; and deleting the first chunk and the second chunk. 19. The machine-readable storage medium of claim 18, wherein the deferral condition is satisfied by a parameter of the geographically distributed storage system transitioning a selectable threshold value. 20. The machine-readable storage medium of claim 18, wherein: the determining the fourth chunk comprises replicating the first chunk and deconvolving the second chunk based on the replicate of the first chunk, or the determining the fourth chunk comprises replicating at least the third chunk but does not comprise deconvolving the second chunk based on a replicate of the first chunk.
Log-based storage space management related to data convolution in a geographically diverse data storage system is disclosed. Data chunks stored in storage devices of different zones of a zone storage system can be convolved to conserve computing resources. Deletion of a chunk from a first zone can be coupled to generating another chunk in another zone to preserve the integrity of a redundant data protection scheme. In response to determining that a first chunk is to be deleted, a log can be generated that can indicate the first chunk is available to be deleted and can indicate other affected chunks. In an aspect, the other affected chunks can comprise a convolved chunk that can convolve the first chunk and at least a second chunk. Accordingly a third chunk can be generated to facilitate deletion of the first chunk while preserving protection of information in the second chunk. Generation of the third chunk can be deferred until a threshold condition is determined to be satisfied.1. A system, comprising: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: in response to determining that a first chunk is to be deleted from a first zone storage component of a geographically distributed storage system, logging an indicator corresponding to the first chunk; in response to determining that a second chunk convolves first information represented in the first chunk, logging a second indicator corresponding to the second chunk, wherein the second chunk is stored via a second zone storage component of the geographically distributed storage system, and wherein the second chunk provides redundancy of the data of the first chunk; and in response to generating a third data chunk based on at least the first indicator and the second indicator, wherein the third chunk represents other information of chunks convolved in the second chunk and excludes representation of the first information of the first chunk, deleting the first chunk and the second chunk. 2. The system of claim 1, wherein the generating the third data chunk is deferred until a condition of the geographically distributed storage system is determined to satisfy a rule related to triggering deletion of the first chunk. 3. The system of claim 2, wherein the rule relates to a threshold count of other chunks to be deleted being logged in the geographically distributed storage system. 4. The system of claim 3, wherein the second chunk convolves other information represented in the other chunks to be deleted. 5. The system of claim 2, wherein the rule is a temporal rule relating to a selectable elapsed time after the determining that the first chunk is to be deleted. 6. The system of claim 2, wherein the rule is a computing resource rule relating to a selectable processor availability threshold. 7. The system of claim 2, wherein the rule is a computing resource rule relating to a selectable remaining storage threshold of the first zone storage component. 8. The system of claim 2, wherein the rule is a computing resource rule relating to a selectable remaining storage threshold of the second zone storage component. 9. The system of claim 1, wherein the generating the third chunk comprises reducing a level of convolution of the second chunk based on the second chunk, the first chunk, the second indicator, and the first indicator. 10. The system of claim 1, wherein the second chunk comprises convolution of information of the first chunk and information of a fourth chunk, wherein the fourth chunk is stored via a third zone storage component of the geographically distributed storage system. 11. The system of claim 10, wherein the generating the third chunk comprises replicating the fourth chunk. 12. The system of claim 10, wherein the generating the third chunk does not comprise replicating the first chunk and does not comprise deconvolution of the second chunk based on the first chunk. 13. A method, comprising: determining, by a system comprising a processor, that a first chunk is to be deleted from a first zone storage component of a geographically distributed storage system; determining, by the system, that a second chunk convolves information represented in the first chunk and at least a third chunk, wherein the second chunk is stored via a second zone storage component of the geographically distributed storage system, wherein at least the third chunk is stored via at least a third zone storage component of the geographically distributed storage system, and wherein the second chunk provides redundancy for the first chunk and redundancy for at least the third chunk; generating, by the system, a first record indicating the first chunk is available to be deleted and a second record indicating that the second chunk convolves information of the first chunk that is available to be deleted with information of the third chunk; in response to determining, by the system, that a deferral condition is satisfied, determining a fourth chunk based on at least the first record and the second record; and deleting, by the system, the first chunk and the second chunk. 14. The method of claim 11, wherein the determining that the deferral condition is satisfied comprises determining that a parameter of the geographically distributed storage system has transitioned a selectable threshold value. 15. The method of claim 11, wherein the determining the fourth chunk comprises replicating the first chunk and deconvolving the second chunk based on the replicate of the first chunk. 16. The method of claim 11, wherein the determining the fourth chunk comprises replicating at least the third chunk but does not comprise deconvolving the second chunk based on a replicate of the first chunk. 17. The method of claim 11, wherein the determining the fourth chunk comprises determining a null chunk. 18. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising: determining that a first chunk is to be deleted from a first zone storage component of a geographically distributed storage system, wherein the first chunk is related to a second chunk via the second chunk convolving information represented in the first chunk and at least a third chunk, wherein the second chunk is stored via a second zone storage component of the geographically distributed storage system, wherein at least the third chunk is stored via at least a third zone storage component of the geographically distributed storage system, and wherein the second chunk provides redundancy for the first chunk and redundancy for at least the third chunk; logging a first record indicating the first chunk is available to be deleted and a second record indicating that the second chunk convolves information of the first chunk with information of at least the third chunk and that the first chunk is available to be deleted; in response to determining that a deferral condition is satisfied, generating a fourth chunk that redundantly protects at least the third chunk and is based on the first record and the second record; and deleting the first chunk and the second chunk. 19. The machine-readable storage medium of claim 18, wherein the deferral condition is satisfied by a parameter of the geographically distributed storage system transitioning a selectable threshold value. 20. The machine-readable storage medium of claim 18, wherein: the determining the fourth chunk comprises replicating the first chunk and deconvolving the second chunk based on the replicate of the first chunk, or the determining the fourth chunk comprises replicating at least the third chunk but does not comprise deconvolving the second chunk based on a replicate of the first chunk.
2,600
344,443
16,803,945
2,684
Systems, methods, and devices for automatic generation of a stimulation therapy that mimics electrographic activity in the brain at natural seizure termination define a stimulation therapy to be generated by an implanted component of a medical device system and delivered to a subject through identifying data characterizing a patient's seizures, especially at termination. A machine learning model identifies the seizures or seizure types from which to establish a canonical seizure or seizure type, and an algorithm translates the canonical seizure or seizure type into data that can be used to characterize a stimulation therapy. The systems, methods, and devices, include those configured to deliver the stimulation therapy that emulates the canonical seizure or seizure type when the seizure is detected, with the aim of terminating the seizure sooner than it would terminate without intervention.
1. A method for defining a stimulation therapy to be generated by an implanted neurostimulator and delivered to a subject through identifying data characterizing a termination of a patient's electrographic seizure, each electrographic seizure characterized by an onset, an evolution, and a termination the method comprising: training a machine learning model with a training set comprising a first plurality of seizures relating to a subject and identifying in the training set, at least one instance of a seizure termination for that patient's electrographic seizures; applying the trained machine learning model to a second plurality of seizures relating to the subject and identifying whether there is at least one instance of a seizure termination for that patient's electrographic seizures in the second plurality of seizures; generating a canonical seizure termination from any identified instances of a seizure termination; applying the canonical seizure termination to an analyzer; determining with the analyzer a waveform that characterizes the canonical seizure termination; and generating with a stimulation generator a stimulation therapy that corresponds to the waveform. 2. The method of claim 1, wherein the training set includes one of raw time-series data, a spectrogram or raw time-series data, and a coherogram of raw time-series data. 3. The method of claim 1, wherein each seizure included in either the first plurality of seizures or the second plurality of seizures comprises at least two channels of data, where the data is recorded as a local field potential voltage over time, and where each channel corresponds to data recorded from a different pair of recording sites than the recording sites for every other channel. 4. The method of claim 1, wherein the canonical seizure termination comprises a single pattern representative of multiple instances of a seizure termination identified in the first plurality of seizures, the second plurality of seizures, or both the first plurality of seizures and the second plurality of seizures. 5. The method of claim 1, wherein generating the canonical seizure termination comprises: selecting multiple instances of a seizure termination identified in the first plurality of seizures, the second plurality of seizures, or both the first plurality of seizures and the second plurality of seizure; time-aligning the selected multiple instances of seizure terminations to create a time-aligned data set; and generating average data based on the time-aligned data set. 6. The method of claim 5, wherein time-aligning the selected multiple instances of a seizure termination and generating average data based on the time-aligned data set includes time-aligning via dynamic time warping and generating average data based on the dynamic time warping results. 7. The method of claim 1, wherein: applying the trained machine learning model to a second plurality of seizures relating to the subject and identifying whether there is at least one instance of a seizure termination for that patient's electrographic seizures in the second plurality of seizures further comprises identifying multiple instances of a seizure termination for that patient's electrographic seizures in the second plurality of seizures; and generating the canonical seizure termination further comprises: generating a high-level feature space representation of the multiple instances of seizure terminations; defining a low-level representation of the multiple instances of seizure terminations; projecting the high-level feature space representation onto the low-level representation to create a projected seizure termination; and identifying the projected seizure termination as the canonical seizure termination. 8. The method of claim 1, wherein determining with the analyzer a waveform that characterizes the canonical seizure termination comprises: comparing each of a plurality of aspects of the waveform to a threshold that corresponds to the each of the plurality of waveform aspects; and creating pulse characterization data that defines at least one pulse for each waveform aspect based on how the waveform aspect compares to the corresponding threshold. 9. The method of claim 8, wherein each defined pulse is associated with an amplitude. 10. The method of claim 9, further comprises associating each defined pulse with an amplitude that will vary over a time the pulse is delivered based on a variance of the waveform aspect that corresponds to the pulse from the threshold over a similar period of time. 11. The method of claim 10, wherein associating each defined pulse with a varying amplitude further comprises: dividing each waveform aspect into a plurality of waveform portions; comparing each waveform portion to the corresponding threshold; determining a difference between each waveform portion and the corresponding threshold; and creating pulse characterization data that defines at least one pulse for each waveform aspect based on how the waveform aspect compares to the corresponding threshold includes specifying an amplitude for each defined pulse which amplitude over a duration of the pulse varies proportionally to the difference between each waveform portion and the corresponding threshold. 12. The method of claim 1, wherein determining with the analyzer a waveform that characterizes the canonical seizure termination comprises: identifying a plurality of aspects with which to approximate the waveform; and creating pulse characterization data that defines at least one biphasic pulse for at least some of the plurality of aspects. 13. The method of claim 1, wherein determining with the analyzer a waveform that characterizes the canonical seizure termination comprises: identifying a plurality of aspects with which to approximate the waveform and characterizing each of the plurality of aspects with a duration; and creating pulse characterization data that defines a pulse corresponding to each waveform aspect and associates each pulse with a pulse width, wherein the pulse width corresponds to the duration of the waveform aspect. 14. The method of claim 13, wherein characterizing each of the plurality of aspects with a duration includes comparing each waveform aspect to one or more thresholds to establish the duration. 15. A method for defining a stimulation therapy to be generated by an implanted neurostimulator and delivered to a subject through identifying data characterizing a termination of a patient's electrographic seizure, each electrographic seizure characterized by an onset, an evolution, and a termination the method comprising: analyzing a first data set comprising electrographic data collected from at least one subject to determine whether there are any instances of seizure termination in the data set for the at least one subject; if there are any instances of seizure termination in the data set for the at least one subject, identifying a second data set comprising the electrographic data that include the instances of seizure termination; generating at least one canonical seizure termination from the second data set; applying the canonical seizure termination to an analyzer; determining with the analyzer a waveform that characterizes the canonical seizure termination; and generating with a stimulation generator a stimulation therapy that corresponds to the waveform. 16. The method of claim 15, wherein identifying a second data set comprising the instances of seizure termination further comprises: identifying in the second data set, at least one subset of electrographic data as a class of electrographic seizure, where determining whether to include electrographic data in the class includes determining whether the electrographic data exhibits at least one feature that is common to all electrographic data in the class; and generating at least one canonical seizure termination includes generating a canonical seizure termination for each identified subset. 17. The method of claim 15, wherein: identifying a second data set comprising the instances of seizure termination further comprises: identifying in the second data set a plurality of subsets of electrographic data, where each subset is a distinct class of electrographic seizure, where determining whether to include electrographic data in a particular one of the classes includes determining whether the electrographic data exhibits at least one feature that is common to all electrographic data in the class; and generating a canonical seizure termination includes generating a canonical seizure termination for each identified subset. 18. The method of claim 17, wherein the at least one feature is a feature that characterizes the electrographic data before termination. 19. The method of claim 15, further comprising updating software of a neurostimulator to enable generating with a stimulation generator the stimulation therapy that corresponds to the waveform. 20. A method of treating a patient's electrographic seizures with electrical stimulation, the electrographic seizure characterized by an onset, an evolution, and an offset, the method comprising: modeling a plurality of electrographic seizures to identify a canonical seizure offset corresponding to the plurality of electrographic seizures; creating a stimulation therapy that emulates the canonical seizure offset; monitoring a patient's electrographic activity for instances of the electrographic seizure; and responding to detection of an instance of the electrographic seizure with the stimulation therapy. 21. The method of claim 20, wherein modeling a plurality of electrographic seizures to identify a canonical seizure offset corresponding to the plurality of electrographic seizures comprises: identifying at least one seizure type in the plurality of electrographic seizures; and modeling the at least one seizure type to identify a corresponding canonical seizure offset. 22. The method of claim 21, wherein identifying at least one seizure type in the plurality of electrographic seizures comprises identifying a first seizure type and a second seizure type. 23. The method of claim 22, wherein creating a stimulation therapy that emulates the canonical seizure offset comprises: creating a first stimulation therapy that emulates the canonical seizure offset modeled for the first seizure type; and creating a second stimulation therapy that emulates the canonical seizure offset modeled for the second seizure type. 24. The method of claim 22, further comprising: monitoring a patient's electrographic activity for an instance of an electrographic seizure; determining when an instance of an electrographic seizure is detected; and when an instance of the electrographic seizure is detected: analyzing the instance of the electrographic seizure to establish to which seizure type it corresponds; and responding with the stimulation therapy created to emulate the canonical seizure offset modeled for the corresponding seizure type. 25. The method of claim 20, wherein creating a stimulation therapy that emulates the canonical seizure offset further comprises: creating a stimulation therapy for each canonical seizure offset that is different than any stimulation therapy created to emulate any other canonical seizure offset. 26. The method of claim 20, wherein modeling a plurality of electrographic seizures to identify a canonical seizure offset corresponding to the plurality of electrographic seizures includes training a machine learning model to recognize at least one type of electrographic seizure in set of electrographic data by identifying for the machine learning model samples of electrographic data in which the at least one type of electrographic seizure is predetermined and defined. 27. The method of claim 26, wherein the machine learning model may be characterized as one or more of a deep learning model, a clustering algorithm, a recurrent neural network, a hidden Markov model, a long short term memory neural network. 28. The method of claim 20, wherein monitoring a patient's electrographic activity for an instance of an electrographic seizure includes: monitoring for instances of an onset of an electrographic seizure; and when an instance of the onset of the electrographic seizure is detected, responding with the stimulation therapy created to emulate the canonical seizure offset modeled for the corresponding seizure. 29. The method of claim 20, wherein the modeling identifies the canonical seizure offset using time-series data derived after time-aligning the plurality of electrographic seizures using dynamic time warping and then averaging the time-aligned plurality of seizures. 30. The method of claim 20, wherein creating a stimulation therapy that emulates the canonical seizure offset further comprises: creating pulse characterization data based on the canonical seizure offset; and responding with the stimulation therapy created to emulate the canonical seizure offset modeled for the corresponding seizure type comprises translating the pulse characterization data into a train of stimulation pulses configured to be delivered to the patient. 31. The method of claim 20, wherein creating a stimulation therapy that emulates the canonical seizure offset further comprises discretizing the canonical seizure offset by: identifying discrete portions of the canonical seizure offset; comparing each discrete portion to a threshold; and creating pulse characterization data specifying pulses corresponding to a measure of each discrete portion against its associated threshold, wherein each specified pulse is biphasic, and is characterized by an amplitude that will vary according to a variance of each discrete portion relative to its associated threshold. 32. A system for delivering a stimulation therapy to a portion of a human brain in response to detection of an electrographic seizure, the system comprising: an implantable neurostimulator comprising: a plurality of electrodes; a detection module coupled to the plurality of electrodes, the detection module configured to monitor electrographic activity sensed from the brain via one or more of the electrodes, and analyze the monitored electrographic activity to detect when an onset of an electrographic seizure occurs; a processor configured to model a plurality of electrographic seizures to identify a canonical seizure offset corresponding to the plurality of electrographic seizures, and create a stimulation therapy that emulates the canonical seizure offset; a control module configured to, when the detection module detects an onset, select a stimulation therapy to be generated; and a stimulation generator configured to generate the stimulation therapy selected by the control module, and deliver the stimulation therapy to the brain through one or more of the electrodes in response to detection of the onset. 33. The system of claim 32, wherein the processor configured to model a plurality of electrographic seizures to identify a canonical seizure offset corresponding to the plurality of electrographic seizures is further configured to: in the plurality of electrographic seizures, identify at least a first seizure type and a second seizure type; identify a first canonical seizure offset corresponding to the first seizure type; and identify a second canonical seizure offset corresponding to the second seizure type. 34. The system of claim 33, wherein the processor configured to create a stimulation therapy that emulates the canonical seizure offset is further configured to: create a first stimulation therapy that emulates the first canonical seizure offset; and create a second stimulation therapy that emulates the second canonical seizure offset. 35. The system of claim 32, wherein: the detection module coupled to the plurality of electrodes is further configured to: monitor electrographic activity sensed from the brain via one or more of the electrodes; analyze the monitored electrographic activity to detect when an onset of an electrographic seizure of one of a plurality of seizure types occurs; and classifying the electrographic seizure when the onset is detected into one of a plurality of possible seizure types; the processor is further configured to: model a plurality of electrographic seizures to identify a canonical seizure offset corresponding to the plurality of electrographic seizures for each of the plurality of possible seizure types; and create a stimulation therapy that emulates the canonical seizure offset for each of the possible seizure types; the control module is further configured to: when the detection module detects an onset and classifies the electrographic seizure into one of the plurality of seizure types, select a seizure-type specific stimulation therapy by selecting the stimulation therapy that emulates the canonical seizure offset for that seizure type to be generated; and the stimulation generator is further configured to: generate the seizure-type specific stimulation therapy selected by the control module; and deliver the seizure-type specific stimulation therapy to the brain through one or more of the electrodes in response to detection of the onset. 36. A method for defining a stimulation therapy to be generated by an implanted neurostimulator and delivered to a patient based on one or more canonical seizure patterns determined for the patient's brain, the method comprising: using a machine learning model to identify seizure specimens in a first dataset comprising a plurality of seizures represented in electrographic information obtained from one or more patients, wherein each seizure specimen is characterized by an onset, an evolution, and a termination; classifying each seizure specimen into a seizure type; analyzing the seizure specimens of each seizure type to identify a canonical seizure pattern for that seizure type, where the pattern includes elements corresponding to each of the onset, evolution, and termination; and creating a stimulation therapy emulating each canonical seizure pattern, wherein the stimulation therapy is intended to be delivered to a patient upon detection of the onset of a seizure of the seizure type to which the canonical seizure pattern corresponds.
Systems, methods, and devices for automatic generation of a stimulation therapy that mimics electrographic activity in the brain at natural seizure termination define a stimulation therapy to be generated by an implanted component of a medical device system and delivered to a subject through identifying data characterizing a patient's seizures, especially at termination. A machine learning model identifies the seizures or seizure types from which to establish a canonical seizure or seizure type, and an algorithm translates the canonical seizure or seizure type into data that can be used to characterize a stimulation therapy. The systems, methods, and devices, include those configured to deliver the stimulation therapy that emulates the canonical seizure or seizure type when the seizure is detected, with the aim of terminating the seizure sooner than it would terminate without intervention.1. A method for defining a stimulation therapy to be generated by an implanted neurostimulator and delivered to a subject through identifying data characterizing a termination of a patient's electrographic seizure, each electrographic seizure characterized by an onset, an evolution, and a termination the method comprising: training a machine learning model with a training set comprising a first plurality of seizures relating to a subject and identifying in the training set, at least one instance of a seizure termination for that patient's electrographic seizures; applying the trained machine learning model to a second plurality of seizures relating to the subject and identifying whether there is at least one instance of a seizure termination for that patient's electrographic seizures in the second plurality of seizures; generating a canonical seizure termination from any identified instances of a seizure termination; applying the canonical seizure termination to an analyzer; determining with the analyzer a waveform that characterizes the canonical seizure termination; and generating with a stimulation generator a stimulation therapy that corresponds to the waveform. 2. The method of claim 1, wherein the training set includes one of raw time-series data, a spectrogram or raw time-series data, and a coherogram of raw time-series data. 3. The method of claim 1, wherein each seizure included in either the first plurality of seizures or the second plurality of seizures comprises at least two channels of data, where the data is recorded as a local field potential voltage over time, and where each channel corresponds to data recorded from a different pair of recording sites than the recording sites for every other channel. 4. The method of claim 1, wherein the canonical seizure termination comprises a single pattern representative of multiple instances of a seizure termination identified in the first plurality of seizures, the second plurality of seizures, or both the first plurality of seizures and the second plurality of seizures. 5. The method of claim 1, wherein generating the canonical seizure termination comprises: selecting multiple instances of a seizure termination identified in the first plurality of seizures, the second plurality of seizures, or both the first plurality of seizures and the second plurality of seizure; time-aligning the selected multiple instances of seizure terminations to create a time-aligned data set; and generating average data based on the time-aligned data set. 6. The method of claim 5, wherein time-aligning the selected multiple instances of a seizure termination and generating average data based on the time-aligned data set includes time-aligning via dynamic time warping and generating average data based on the dynamic time warping results. 7. The method of claim 1, wherein: applying the trained machine learning model to a second plurality of seizures relating to the subject and identifying whether there is at least one instance of a seizure termination for that patient's electrographic seizures in the second plurality of seizures further comprises identifying multiple instances of a seizure termination for that patient's electrographic seizures in the second plurality of seizures; and generating the canonical seizure termination further comprises: generating a high-level feature space representation of the multiple instances of seizure terminations; defining a low-level representation of the multiple instances of seizure terminations; projecting the high-level feature space representation onto the low-level representation to create a projected seizure termination; and identifying the projected seizure termination as the canonical seizure termination. 8. The method of claim 1, wherein determining with the analyzer a waveform that characterizes the canonical seizure termination comprises: comparing each of a plurality of aspects of the waveform to a threshold that corresponds to the each of the plurality of waveform aspects; and creating pulse characterization data that defines at least one pulse for each waveform aspect based on how the waveform aspect compares to the corresponding threshold. 9. The method of claim 8, wherein each defined pulse is associated with an amplitude. 10. The method of claim 9, further comprises associating each defined pulse with an amplitude that will vary over a time the pulse is delivered based on a variance of the waveform aspect that corresponds to the pulse from the threshold over a similar period of time. 11. The method of claim 10, wherein associating each defined pulse with a varying amplitude further comprises: dividing each waveform aspect into a plurality of waveform portions; comparing each waveform portion to the corresponding threshold; determining a difference between each waveform portion and the corresponding threshold; and creating pulse characterization data that defines at least one pulse for each waveform aspect based on how the waveform aspect compares to the corresponding threshold includes specifying an amplitude for each defined pulse which amplitude over a duration of the pulse varies proportionally to the difference between each waveform portion and the corresponding threshold. 12. The method of claim 1, wherein determining with the analyzer a waveform that characterizes the canonical seizure termination comprises: identifying a plurality of aspects with which to approximate the waveform; and creating pulse characterization data that defines at least one biphasic pulse for at least some of the plurality of aspects. 13. The method of claim 1, wherein determining with the analyzer a waveform that characterizes the canonical seizure termination comprises: identifying a plurality of aspects with which to approximate the waveform and characterizing each of the plurality of aspects with a duration; and creating pulse characterization data that defines a pulse corresponding to each waveform aspect and associates each pulse with a pulse width, wherein the pulse width corresponds to the duration of the waveform aspect. 14. The method of claim 13, wherein characterizing each of the plurality of aspects with a duration includes comparing each waveform aspect to one or more thresholds to establish the duration. 15. A method for defining a stimulation therapy to be generated by an implanted neurostimulator and delivered to a subject through identifying data characterizing a termination of a patient's electrographic seizure, each electrographic seizure characterized by an onset, an evolution, and a termination the method comprising: analyzing a first data set comprising electrographic data collected from at least one subject to determine whether there are any instances of seizure termination in the data set for the at least one subject; if there are any instances of seizure termination in the data set for the at least one subject, identifying a second data set comprising the electrographic data that include the instances of seizure termination; generating at least one canonical seizure termination from the second data set; applying the canonical seizure termination to an analyzer; determining with the analyzer a waveform that characterizes the canonical seizure termination; and generating with a stimulation generator a stimulation therapy that corresponds to the waveform. 16. The method of claim 15, wherein identifying a second data set comprising the instances of seizure termination further comprises: identifying in the second data set, at least one subset of electrographic data as a class of electrographic seizure, where determining whether to include electrographic data in the class includes determining whether the electrographic data exhibits at least one feature that is common to all electrographic data in the class; and generating at least one canonical seizure termination includes generating a canonical seizure termination for each identified subset. 17. The method of claim 15, wherein: identifying a second data set comprising the instances of seizure termination further comprises: identifying in the second data set a plurality of subsets of electrographic data, where each subset is a distinct class of electrographic seizure, where determining whether to include electrographic data in a particular one of the classes includes determining whether the electrographic data exhibits at least one feature that is common to all electrographic data in the class; and generating a canonical seizure termination includes generating a canonical seizure termination for each identified subset. 18. The method of claim 17, wherein the at least one feature is a feature that characterizes the electrographic data before termination. 19. The method of claim 15, further comprising updating software of a neurostimulator to enable generating with a stimulation generator the stimulation therapy that corresponds to the waveform. 20. A method of treating a patient's electrographic seizures with electrical stimulation, the electrographic seizure characterized by an onset, an evolution, and an offset, the method comprising: modeling a plurality of electrographic seizures to identify a canonical seizure offset corresponding to the plurality of electrographic seizures; creating a stimulation therapy that emulates the canonical seizure offset; monitoring a patient's electrographic activity for instances of the electrographic seizure; and responding to detection of an instance of the electrographic seizure with the stimulation therapy. 21. The method of claim 20, wherein modeling a plurality of electrographic seizures to identify a canonical seizure offset corresponding to the plurality of electrographic seizures comprises: identifying at least one seizure type in the plurality of electrographic seizures; and modeling the at least one seizure type to identify a corresponding canonical seizure offset. 22. The method of claim 21, wherein identifying at least one seizure type in the plurality of electrographic seizures comprises identifying a first seizure type and a second seizure type. 23. The method of claim 22, wherein creating a stimulation therapy that emulates the canonical seizure offset comprises: creating a first stimulation therapy that emulates the canonical seizure offset modeled for the first seizure type; and creating a second stimulation therapy that emulates the canonical seizure offset modeled for the second seizure type. 24. The method of claim 22, further comprising: monitoring a patient's electrographic activity for an instance of an electrographic seizure; determining when an instance of an electrographic seizure is detected; and when an instance of the electrographic seizure is detected: analyzing the instance of the electrographic seizure to establish to which seizure type it corresponds; and responding with the stimulation therapy created to emulate the canonical seizure offset modeled for the corresponding seizure type. 25. The method of claim 20, wherein creating a stimulation therapy that emulates the canonical seizure offset further comprises: creating a stimulation therapy for each canonical seizure offset that is different than any stimulation therapy created to emulate any other canonical seizure offset. 26. The method of claim 20, wherein modeling a plurality of electrographic seizures to identify a canonical seizure offset corresponding to the plurality of electrographic seizures includes training a machine learning model to recognize at least one type of electrographic seizure in set of electrographic data by identifying for the machine learning model samples of electrographic data in which the at least one type of electrographic seizure is predetermined and defined. 27. The method of claim 26, wherein the machine learning model may be characterized as one or more of a deep learning model, a clustering algorithm, a recurrent neural network, a hidden Markov model, a long short term memory neural network. 28. The method of claim 20, wherein monitoring a patient's electrographic activity for an instance of an electrographic seizure includes: monitoring for instances of an onset of an electrographic seizure; and when an instance of the onset of the electrographic seizure is detected, responding with the stimulation therapy created to emulate the canonical seizure offset modeled for the corresponding seizure. 29. The method of claim 20, wherein the modeling identifies the canonical seizure offset using time-series data derived after time-aligning the plurality of electrographic seizures using dynamic time warping and then averaging the time-aligned plurality of seizures. 30. The method of claim 20, wherein creating a stimulation therapy that emulates the canonical seizure offset further comprises: creating pulse characterization data based on the canonical seizure offset; and responding with the stimulation therapy created to emulate the canonical seizure offset modeled for the corresponding seizure type comprises translating the pulse characterization data into a train of stimulation pulses configured to be delivered to the patient. 31. The method of claim 20, wherein creating a stimulation therapy that emulates the canonical seizure offset further comprises discretizing the canonical seizure offset by: identifying discrete portions of the canonical seizure offset; comparing each discrete portion to a threshold; and creating pulse characterization data specifying pulses corresponding to a measure of each discrete portion against its associated threshold, wherein each specified pulse is biphasic, and is characterized by an amplitude that will vary according to a variance of each discrete portion relative to its associated threshold. 32. A system for delivering a stimulation therapy to a portion of a human brain in response to detection of an electrographic seizure, the system comprising: an implantable neurostimulator comprising: a plurality of electrodes; a detection module coupled to the plurality of electrodes, the detection module configured to monitor electrographic activity sensed from the brain via one or more of the electrodes, and analyze the monitored electrographic activity to detect when an onset of an electrographic seizure occurs; a processor configured to model a plurality of electrographic seizures to identify a canonical seizure offset corresponding to the plurality of electrographic seizures, and create a stimulation therapy that emulates the canonical seizure offset; a control module configured to, when the detection module detects an onset, select a stimulation therapy to be generated; and a stimulation generator configured to generate the stimulation therapy selected by the control module, and deliver the stimulation therapy to the brain through one or more of the electrodes in response to detection of the onset. 33. The system of claim 32, wherein the processor configured to model a plurality of electrographic seizures to identify a canonical seizure offset corresponding to the plurality of electrographic seizures is further configured to: in the plurality of electrographic seizures, identify at least a first seizure type and a second seizure type; identify a first canonical seizure offset corresponding to the first seizure type; and identify a second canonical seizure offset corresponding to the second seizure type. 34. The system of claim 33, wherein the processor configured to create a stimulation therapy that emulates the canonical seizure offset is further configured to: create a first stimulation therapy that emulates the first canonical seizure offset; and create a second stimulation therapy that emulates the second canonical seizure offset. 35. The system of claim 32, wherein: the detection module coupled to the plurality of electrodes is further configured to: monitor electrographic activity sensed from the brain via one or more of the electrodes; analyze the monitored electrographic activity to detect when an onset of an electrographic seizure of one of a plurality of seizure types occurs; and classifying the electrographic seizure when the onset is detected into one of a plurality of possible seizure types; the processor is further configured to: model a plurality of electrographic seizures to identify a canonical seizure offset corresponding to the plurality of electrographic seizures for each of the plurality of possible seizure types; and create a stimulation therapy that emulates the canonical seizure offset for each of the possible seizure types; the control module is further configured to: when the detection module detects an onset and classifies the electrographic seizure into one of the plurality of seizure types, select a seizure-type specific stimulation therapy by selecting the stimulation therapy that emulates the canonical seizure offset for that seizure type to be generated; and the stimulation generator is further configured to: generate the seizure-type specific stimulation therapy selected by the control module; and deliver the seizure-type specific stimulation therapy to the brain through one or more of the electrodes in response to detection of the onset. 36. A method for defining a stimulation therapy to be generated by an implanted neurostimulator and delivered to a patient based on one or more canonical seizure patterns determined for the patient's brain, the method comprising: using a machine learning model to identify seizure specimens in a first dataset comprising a plurality of seizures represented in electrographic information obtained from one or more patients, wherein each seizure specimen is characterized by an onset, an evolution, and a termination; classifying each seizure specimen into a seizure type; analyzing the seizure specimens of each seizure type to identify a canonical seizure pattern for that seizure type, where the pattern includes elements corresponding to each of the onset, evolution, and termination; and creating a stimulation therapy emulating each canonical seizure pattern, wherein the stimulation therapy is intended to be delivered to a patient upon detection of the onset of a seizure of the seizure type to which the canonical seizure pattern corresponds.
2,600
344,444
16,803,967
1,784
An electroplating copper layer includes bamboo-like copper crystal particles having a highly preferred orientation. The bamboo-like copper crystal particles have a long axis direction and a short axis direction, and the bamboo-like copper crystal particles have a length of 20 nm to 5 μm in the long axis direction and a length of 20 nm to 2 μm in the short axis direction. The bamboo-like copper crystal particles have a uniform particle size, and the electroplating copper layer has a major diffraction peak at a 2θ angle of about 44°.
1. (canceled) 2. (canceled) 3. (canceled) 4. (canceled) 5. (canceled) 6. (canceled) 7. An electroplating copper layer comprising: bamboo-like copper crystal particles having a highly preferred orientation, wherein the bamboo-like copper crystal particles have a long axis direction and a short axis direction, and the bamboo-like copper crystal particles have a length of 20 nm to 5 μm in the long axis direction and a length of 20 nm to 2 μm in the short axis direction. 8. The electroplating copper layer of claim 7, wherein a first plurality of the bamboo-like copper crystal particles have a preferred orientation, and the preferred orientation is a direction perpendicular to a copper substrate on which the electroplating copper layer is deposited. 9. The electroplating copper layer of claim 8, wherein a second plurality of the bamboo-like copper crystal particles have a second orientation, the second orientation and the preferred orientation forms an angle of great than 0° and less than 45°, and the second plurality of the bamboo-like copper crystal particles constitutes 50-90% of all the bamboo-like copper crystal particles. 10. The electroplating copper layer of claim 7, wherein the bamboo-like copper crystal particles have a uniform particle size. 11. The electroplating copper layer of claim 7, wherein the electroplating copper layer has a major diffraction peak at a 2θ angle of about 44°.
An electroplating copper layer includes bamboo-like copper crystal particles having a highly preferred orientation. The bamboo-like copper crystal particles have a long axis direction and a short axis direction, and the bamboo-like copper crystal particles have a length of 20 nm to 5 μm in the long axis direction and a length of 20 nm to 2 μm in the short axis direction. The bamboo-like copper crystal particles have a uniform particle size, and the electroplating copper layer has a major diffraction peak at a 2θ angle of about 44°.1. (canceled) 2. (canceled) 3. (canceled) 4. (canceled) 5. (canceled) 6. (canceled) 7. An electroplating copper layer comprising: bamboo-like copper crystal particles having a highly preferred orientation, wherein the bamboo-like copper crystal particles have a long axis direction and a short axis direction, and the bamboo-like copper crystal particles have a length of 20 nm to 5 μm in the long axis direction and a length of 20 nm to 2 μm in the short axis direction. 8. The electroplating copper layer of claim 7, wherein a first plurality of the bamboo-like copper crystal particles have a preferred orientation, and the preferred orientation is a direction perpendicular to a copper substrate on which the electroplating copper layer is deposited. 9. The electroplating copper layer of claim 8, wherein a second plurality of the bamboo-like copper crystal particles have a second orientation, the second orientation and the preferred orientation forms an angle of great than 0° and less than 45°, and the second plurality of the bamboo-like copper crystal particles constitutes 50-90% of all the bamboo-like copper crystal particles. 10. The electroplating copper layer of claim 7, wherein the bamboo-like copper crystal particles have a uniform particle size. 11. The electroplating copper layer of claim 7, wherein the electroplating copper layer has a major diffraction peak at a 2θ angle of about 44°.
1,700
344,445
16,803,904
2,625
An electronic device displays, on a display, a user interface that includes one or more user interface objects. The device detects a first input on the touch-sensitive surface at a location that corresponds to a first user interface object of the one or more user interface objects. Detecting the first input includes detecting a change in intensity of the first input on the touch-sensitive surface from a first intensity to a second intensity, different from the first intensity. In response to detecting the first input, the device obtains a change in a value of a respective simulated physical property that changes in response to changes in intensity of the first input on the touch-sensitive surface, and updates an appearance of the user interface by progressing a first animation between a first state and a second state based on the change in the value of the respective simulated physical property.
1. A computer readable storage medium comprising one or more programs, the one or more programs including instructions that, when executed by an electronic device with a display, a touch-sensitive surface, and one or more sensors for detecting intensities of inputs on the touch-sensitive surface, cause the electronic device to perform operations including: displaying a user interface on the display, wherein the user interface includes one or more user interface objects; detecting a first input on the touch-sensitive surface at a location that corresponds to a first user interface object of the one or more user interface objects on the display, wherein detecting the first input includes detecting a change in intensity of the first input on the touch-sensitive surface from a first intensity to a second intensity that is different from the first intensity; and in response to detecting the first input: obtaining a change in a value of a respective simulated physical property that changes in response to changes in intensity of the first input on the touch-sensitive surface; and updating an appearance of the user interface by progressing a first animation between a first state and a second state based on the change in the value of the respective simulated physical property. 2. The computer readable storage medium of claim 1, wherein progressing the first animation includes updating an appearance of the first user interface object in accordance with the change in the value of the respective simulated physical property. 3. The computer readable storage medium of claim 1, wherein the respective simulated physical property is position of the first user interface object relative to the user interface, and progressing the first animation includes changing the position of the first user interface object relative to the user interface in accordance with simulating the intensity of the first input as a force applied to a spring connecting the first user interface object and the first user interface. 4. The computer readable storage medium of claim 1, wherein the respective simulated physical property is any one of: size, shape, location, weight, elasticity, opacity, transparency, spring constant, velocity, spin, coefficient of attraction, brightness, color, hue, and structural integrity. 5. The computer readable storage medium of claim 1, wherein a rate of change of the first animation corresponds to a rate of change in the intensity of the first input. 6. The computer readable storage medium of claim 1, wherein: the value of the respective simulated physical property changes dynamically in response to changes in the intensity of the first input; and updating the appearance of the user interface includes repeatedly updating the appearance of the user interface as the value of the respective simulated physical property responds dynamically to changes in the intensity of the first input. 7. The computer readable storage medium of claim 1, wherein progressing the animation includes changing a size of the first user interface object. 8. The computer readable storage medium of claim 1, wherein progressing the animation includes changing an opacity of the user interface. 9. The computer readable storage medium of claim 1, wherein progressing the animation includes changing a size of the user interface. 10. The computer readable storage medium of claim 1, wherein the one or more programs include instructions that, when executed by the electronic device, cause the electronic device to perform operations including: after the animation has progressed to the second state, detecting a second input on the touch-sensitive surface at a location that corresponds to the first user interface object on the display, wherein detecting the second input includes detecting a change in intensity of the second input on the touch-sensitive surface from the second intensity to a third intensity that is different from the second intensity; and in response to detecting the second input: obtaining a change in a value of the respective simulated physical property; and updating an appearance of the user interface by progressing a second animation between a third state and a fourth state based on the change in the value of the respective simulated physical property. 11. An electronic device, comprising: a display; a touch-sensitive surface; one or more sensors for detecting intensities of inputs on the touch-sensitive surface; one or more processors; memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for: displaying a user interface on the display, wherein the user interface includes one or more user interface objects; detecting a first input on the touch-sensitive surface at a location that corresponds to a first user interface object of the one or more user interface objects on the display, wherein detecting the first input includes detecting a change in intensity of the first input on the touch-sensitive surface from a first intensity to a second intensity that is different from the first intensity; and in response to detecting the first input: obtaining a change in a value of a respective simulated physical property that changes in response to changes in intensity of the first input on the touch-sensitive surface; and updating an appearance of the user interface by progressing a first animation between a first state and a second state based on the change in the value of the respective simulated physical property. 12. A method, comprising: at an electronic device with a touch-sensitive surface, a display, and one or more sensors for detecting intensities of inputs on the touch-sensitive surface; displaying a user interface on the display, wherein the user interface includes one or more user interface objects; detecting a first input on the touch-sensitive surface at a location that corresponds to a first user interface object of the one or more user interface objects on the display, wherein detecting the first input includes detecting a change in intensity of the first input on the touch-sensitive surface from a first intensity to a second intensity that is different from the first intensity; and in response to detecting the first input: obtaining a change in a value of a respective simulated physical property that changes in response to changes in intensity of the first input on the touch-sensitive surface; and updating an appearance of the user interface by progressing a first animation between a first state and a second state based on the change in the value of the respective simulated physical property.
An electronic device displays, on a display, a user interface that includes one or more user interface objects. The device detects a first input on the touch-sensitive surface at a location that corresponds to a first user interface object of the one or more user interface objects. Detecting the first input includes detecting a change in intensity of the first input on the touch-sensitive surface from a first intensity to a second intensity, different from the first intensity. In response to detecting the first input, the device obtains a change in a value of a respective simulated physical property that changes in response to changes in intensity of the first input on the touch-sensitive surface, and updates an appearance of the user interface by progressing a first animation between a first state and a second state based on the change in the value of the respective simulated physical property.1. A computer readable storage medium comprising one or more programs, the one or more programs including instructions that, when executed by an electronic device with a display, a touch-sensitive surface, and one or more sensors for detecting intensities of inputs on the touch-sensitive surface, cause the electronic device to perform operations including: displaying a user interface on the display, wherein the user interface includes one or more user interface objects; detecting a first input on the touch-sensitive surface at a location that corresponds to a first user interface object of the one or more user interface objects on the display, wherein detecting the first input includes detecting a change in intensity of the first input on the touch-sensitive surface from a first intensity to a second intensity that is different from the first intensity; and in response to detecting the first input: obtaining a change in a value of a respective simulated physical property that changes in response to changes in intensity of the first input on the touch-sensitive surface; and updating an appearance of the user interface by progressing a first animation between a first state and a second state based on the change in the value of the respective simulated physical property. 2. The computer readable storage medium of claim 1, wherein progressing the first animation includes updating an appearance of the first user interface object in accordance with the change in the value of the respective simulated physical property. 3. The computer readable storage medium of claim 1, wherein the respective simulated physical property is position of the first user interface object relative to the user interface, and progressing the first animation includes changing the position of the first user interface object relative to the user interface in accordance with simulating the intensity of the first input as a force applied to a spring connecting the first user interface object and the first user interface. 4. The computer readable storage medium of claim 1, wherein the respective simulated physical property is any one of: size, shape, location, weight, elasticity, opacity, transparency, spring constant, velocity, spin, coefficient of attraction, brightness, color, hue, and structural integrity. 5. The computer readable storage medium of claim 1, wherein a rate of change of the first animation corresponds to a rate of change in the intensity of the first input. 6. The computer readable storage medium of claim 1, wherein: the value of the respective simulated physical property changes dynamically in response to changes in the intensity of the first input; and updating the appearance of the user interface includes repeatedly updating the appearance of the user interface as the value of the respective simulated physical property responds dynamically to changes in the intensity of the first input. 7. The computer readable storage medium of claim 1, wherein progressing the animation includes changing a size of the first user interface object. 8. The computer readable storage medium of claim 1, wherein progressing the animation includes changing an opacity of the user interface. 9. The computer readable storage medium of claim 1, wherein progressing the animation includes changing a size of the user interface. 10. The computer readable storage medium of claim 1, wherein the one or more programs include instructions that, when executed by the electronic device, cause the electronic device to perform operations including: after the animation has progressed to the second state, detecting a second input on the touch-sensitive surface at a location that corresponds to the first user interface object on the display, wherein detecting the second input includes detecting a change in intensity of the second input on the touch-sensitive surface from the second intensity to a third intensity that is different from the second intensity; and in response to detecting the second input: obtaining a change in a value of the respective simulated physical property; and updating an appearance of the user interface by progressing a second animation between a third state and a fourth state based on the change in the value of the respective simulated physical property. 11. An electronic device, comprising: a display; a touch-sensitive surface; one or more sensors for detecting intensities of inputs on the touch-sensitive surface; one or more processors; memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for: displaying a user interface on the display, wherein the user interface includes one or more user interface objects; detecting a first input on the touch-sensitive surface at a location that corresponds to a first user interface object of the one or more user interface objects on the display, wherein detecting the first input includes detecting a change in intensity of the first input on the touch-sensitive surface from a first intensity to a second intensity that is different from the first intensity; and in response to detecting the first input: obtaining a change in a value of a respective simulated physical property that changes in response to changes in intensity of the first input on the touch-sensitive surface; and updating an appearance of the user interface by progressing a first animation between a first state and a second state based on the change in the value of the respective simulated physical property. 12. A method, comprising: at an electronic device with a touch-sensitive surface, a display, and one or more sensors for detecting intensities of inputs on the touch-sensitive surface; displaying a user interface on the display, wherein the user interface includes one or more user interface objects; detecting a first input on the touch-sensitive surface at a location that corresponds to a first user interface object of the one or more user interface objects on the display, wherein detecting the first input includes detecting a change in intensity of the first input on the touch-sensitive surface from a first intensity to a second intensity that is different from the first intensity; and in response to detecting the first input: obtaining a change in a value of a respective simulated physical property that changes in response to changes in intensity of the first input on the touch-sensitive surface; and updating an appearance of the user interface by progressing a first animation between a first state and a second state based on the change in the value of the respective simulated physical property.
2,600
344,446
16,803,950
2,625
Systems and methods are provided for detecting MAC/IP spoofing attacks on networks. A method may include authenticating a network device for access to a network using a Media Access Control (MAC) address and an Internet Protocol (IP) address of the network device; wherein an attacking device is connected to the network, and to the network device, by a network hub; wherein the attacking device spoofs the MAC address and the IP address of the network device; establishing a Transport Control Protocol (TCP) connection with the network device subsequent to authenticating the network device; sending at least one TCP keepalive message to the IP address of the network device, wherein, responsive to receiving the TCP keepalive message, the attacking device transmits a TCP reset (RST) message; receiving the TCP RST message; and determining the attacking device is present in the network responsive to receiving the TCP RST message.
1. A system, comprising: a hardware processor; and a non-transitory machine-readable storage medium encoded with instructions executable by the hardware processor to perform a method comprising: authenticating a network device for access to a network using a Media Access Control (MAC) address and an Internet Protocol (IP) address of the network device; wherein an attacking device is connected to the network, and to the network device, by a network hub; wherein the attacking device spoofs the MAC address and the IP address of the network device; establishing a Transport Control Protocol (TCP) connection with the network device subsequent to authenticating the network device; sending at least one TCP keepalive message to the IP address of the network device, wherein, responsive to receiving the TCP keepalive message, the attacking device transmits a TCP reset (RST) message; receiving the TCP RST message; and determining the attacking device is present in the network responsive to receiving the TCP RST message. 2. The system of claim 1, the method further comprising: performing an action responsive to determining the attacking device is present in the network, wherein the action comprises at least one of: disconnecting, from the network, all network devices using the MAC address of the network device, quarantining all network devices using the MAC address of the network device, and notifying an administrator of the network. 3. The system of claim 1, the method further comprising: sending a Windows management instrumentation (WMI) query to the IP address responsive to receiving the TCP RST message, and prior to performing the action; and performing the action responsive to receiving an improper response to the WMI query. 4. The system of claim 1, wherein: the attacker and the network device are connected to a network hub; and the network hub is connected to an edge switch in the network. 5. The system of claim 1, wherein the authenticating the network device for access to the network complies with the IEEE 802.1X standard. 6. The system of claim 1, wherein the authenticating the network device for access to the network comprises: receiving authentication credentials from the network device; and comparing the authentication credentials to a plurality of authentication credentials stored in an identity store. 7. The system of claim 1, wherein the identity store comprises an Active Directory store. 8. A non-transitory machine-readable storage medium encoded with instructions executable by a hardware processor of a computing component, the machine-readable storage medium comprising instructions to cause the hardware processor to perform a method comprising: authenticating a network device for access to a network using a Media Access Control (MAC) address and an Internet Protocol (IP) address of the network device; wherein an attacking device is connected to the network, and to the network device, by a network hub; wherein the attacking device spoofs the MAC address and the IP address of the network device; establishing a Transport Control Protocol (TCP) connection with the network device subsequent to authenticating the network device; sending at least one TCP keepalive message to the IP address of the network device, wherein, responsive to receiving the TCP keepalive message, the attacking device transmits a TCP reset (RST) message; receiving the TCP RST message; and determining the attacking device is present in the network responsive to receiving the TCP RST message. 9. The medium of claim 8, the method further comprising: performing an action responsive to determining the attacking device is present in the network, wherein the action comprises at least one of: disconnecting, from the network, all network devices using the MAC address of the network device, quarantining all network devices using the MAC address of the network device, and notifying an administrator of the network. 10. The medium of claim 8, the method further comprising: sending a Windows management instrumentation (WMI) query to the IP address responsive to receiving the TCP RST message, and prior to performing the action; and performing the action responsive to receiving an improper response to the WMI query. 11. The medium of claim 8, wherein: the attacker and the network device are connected to a network hub; and the network hub is connected to an edge switch in the network. 12. The medium of claim 8, wherein the authenticating the network device for access to the network complies with the IEEE 802.1X standard. 13. The medium of claim 8, wherein the authenticating the network device for access to the network comprises: receiving authentication credentials from the network device; and comparing the authentication credentials to a plurality of authentication credentials stored in an identity store. 14. The medium of claim 8, wherein the identity store comprises an Active Directory store. 15. A method comprising: authenticating a network device for access to a network using a Media Access Control (MAC) address and an Internet Protocol (IP) address of the network device; wherein an attacking device is connected to the network, and to the network device, by a network hub; wherein the attacking device spoofs the MAC address and the IP address of the network device; establishing a Transport Control Protocol (TCP) connection with the network device subsequent to authenticating the network device; sending at least one TCP keepalive message to the IP address of the network device, wherein, responsive to receiving the TCP keepalive message, the attacking device transmits a TCP reset (RST) message; receiving the TCP RST message; and determining the attacking device is present in the network responsive to receiving the TCP RST message. 16. The method of claim 15, further comprising: performing an action responsive to determining the attacking device is present in the network, wherein the action comprises at least one of: disconnecting, from the network, all network devices using the MAC address of the network device, quarantining all network devices using the MAC address of the network device, and notifying an administrator of the network. 17. The method of claim 15, further comprising: sending a Windows management instrumentation (WMI) query to the IP address responsive to receiving the TCP RST message, and prior to performing the action; and performing the action responsive to receiving an improper response to the WMI query. 18. The method of claim 15, wherein: the attacker and the network device are connected to a network hub; and the network hub is connected to an edge switch in the network. 19. The method of claim 15, wherein the authenticating the network device for access to the network complies with the IEEE 802.1X standard. 20. The method of claim 15, wherein the authenticating the network device for access to the network comprises: receiving authentication credentials from the network device; and comparing the authentication credentials to a plurality of authentication credentials stored in an identity store.
Systems and methods are provided for detecting MAC/IP spoofing attacks on networks. A method may include authenticating a network device for access to a network using a Media Access Control (MAC) address and an Internet Protocol (IP) address of the network device; wherein an attacking device is connected to the network, and to the network device, by a network hub; wherein the attacking device spoofs the MAC address and the IP address of the network device; establishing a Transport Control Protocol (TCP) connection with the network device subsequent to authenticating the network device; sending at least one TCP keepalive message to the IP address of the network device, wherein, responsive to receiving the TCP keepalive message, the attacking device transmits a TCP reset (RST) message; receiving the TCP RST message; and determining the attacking device is present in the network responsive to receiving the TCP RST message.1. A system, comprising: a hardware processor; and a non-transitory machine-readable storage medium encoded with instructions executable by the hardware processor to perform a method comprising: authenticating a network device for access to a network using a Media Access Control (MAC) address and an Internet Protocol (IP) address of the network device; wherein an attacking device is connected to the network, and to the network device, by a network hub; wherein the attacking device spoofs the MAC address and the IP address of the network device; establishing a Transport Control Protocol (TCP) connection with the network device subsequent to authenticating the network device; sending at least one TCP keepalive message to the IP address of the network device, wherein, responsive to receiving the TCP keepalive message, the attacking device transmits a TCP reset (RST) message; receiving the TCP RST message; and determining the attacking device is present in the network responsive to receiving the TCP RST message. 2. The system of claim 1, the method further comprising: performing an action responsive to determining the attacking device is present in the network, wherein the action comprises at least one of: disconnecting, from the network, all network devices using the MAC address of the network device, quarantining all network devices using the MAC address of the network device, and notifying an administrator of the network. 3. The system of claim 1, the method further comprising: sending a Windows management instrumentation (WMI) query to the IP address responsive to receiving the TCP RST message, and prior to performing the action; and performing the action responsive to receiving an improper response to the WMI query. 4. The system of claim 1, wherein: the attacker and the network device are connected to a network hub; and the network hub is connected to an edge switch in the network. 5. The system of claim 1, wherein the authenticating the network device for access to the network complies with the IEEE 802.1X standard. 6. The system of claim 1, wherein the authenticating the network device for access to the network comprises: receiving authentication credentials from the network device; and comparing the authentication credentials to a plurality of authentication credentials stored in an identity store. 7. The system of claim 1, wherein the identity store comprises an Active Directory store. 8. A non-transitory machine-readable storage medium encoded with instructions executable by a hardware processor of a computing component, the machine-readable storage medium comprising instructions to cause the hardware processor to perform a method comprising: authenticating a network device for access to a network using a Media Access Control (MAC) address and an Internet Protocol (IP) address of the network device; wherein an attacking device is connected to the network, and to the network device, by a network hub; wherein the attacking device spoofs the MAC address and the IP address of the network device; establishing a Transport Control Protocol (TCP) connection with the network device subsequent to authenticating the network device; sending at least one TCP keepalive message to the IP address of the network device, wherein, responsive to receiving the TCP keepalive message, the attacking device transmits a TCP reset (RST) message; receiving the TCP RST message; and determining the attacking device is present in the network responsive to receiving the TCP RST message. 9. The medium of claim 8, the method further comprising: performing an action responsive to determining the attacking device is present in the network, wherein the action comprises at least one of: disconnecting, from the network, all network devices using the MAC address of the network device, quarantining all network devices using the MAC address of the network device, and notifying an administrator of the network. 10. The medium of claim 8, the method further comprising: sending a Windows management instrumentation (WMI) query to the IP address responsive to receiving the TCP RST message, and prior to performing the action; and performing the action responsive to receiving an improper response to the WMI query. 11. The medium of claim 8, wherein: the attacker and the network device are connected to a network hub; and the network hub is connected to an edge switch in the network. 12. The medium of claim 8, wherein the authenticating the network device for access to the network complies with the IEEE 802.1X standard. 13. The medium of claim 8, wherein the authenticating the network device for access to the network comprises: receiving authentication credentials from the network device; and comparing the authentication credentials to a plurality of authentication credentials stored in an identity store. 14. The medium of claim 8, wherein the identity store comprises an Active Directory store. 15. A method comprising: authenticating a network device for access to a network using a Media Access Control (MAC) address and an Internet Protocol (IP) address of the network device; wherein an attacking device is connected to the network, and to the network device, by a network hub; wherein the attacking device spoofs the MAC address and the IP address of the network device; establishing a Transport Control Protocol (TCP) connection with the network device subsequent to authenticating the network device; sending at least one TCP keepalive message to the IP address of the network device, wherein, responsive to receiving the TCP keepalive message, the attacking device transmits a TCP reset (RST) message; receiving the TCP RST message; and determining the attacking device is present in the network responsive to receiving the TCP RST message. 16. The method of claim 15, further comprising: performing an action responsive to determining the attacking device is present in the network, wherein the action comprises at least one of: disconnecting, from the network, all network devices using the MAC address of the network device, quarantining all network devices using the MAC address of the network device, and notifying an administrator of the network. 17. The method of claim 15, further comprising: sending a Windows management instrumentation (WMI) query to the IP address responsive to receiving the TCP RST message, and prior to performing the action; and performing the action responsive to receiving an improper response to the WMI query. 18. The method of claim 15, wherein: the attacker and the network device are connected to a network hub; and the network hub is connected to an edge switch in the network. 19. The method of claim 15, wherein the authenticating the network device for access to the network complies with the IEEE 802.1X standard. 20. The method of claim 15, wherein the authenticating the network device for access to the network comprises: receiving authentication credentials from the network device; and comparing the authentication credentials to a plurality of authentication credentials stored in an identity store.
2,600
344,447
16,803,932
2,625
A flexible display panel and a display apparatus including the flexible display panel are disclosed. The flexible display panel includes an encapsulated panel, a first protective film on one side of the encapsulated panel, and a second protective film on another side of the encapsulated panel. The encapsulated panel includes a flexible panel and a flexible encapsulation member on the flexible panel. The flexible panel includes a first region on a first plane and that includes a display region, and a second region on a second plane that is bent with respect to the first plane and that includes a non-display region. The flexible encapsulation member encapsulates the display region. The display apparatus also includes a support unit for maintaining a shape of the flexible panel.
1. A display apparatus comprising: a first protective film; a substrate on the first protective film; a display region and a first non-display region disposed on a first plane of the substrate; a second non-display region disposed on a second plane of the substrate, wherein the second plane is bent with respect to the first plane; a border region between the display region and the second non-display region, the border region extending from the display region and displaying an image; an encapsulation member on the display region, the border region and the second non-display region; and a touch region and touch wirings in wiring regions outside the touch region being disposed on the encapsulation member, wherein the touch region is disposed on the display region and the border region, and wherein the touch wirings are disposed on at least one selected from the first non-display region and the second non-display region. 2. The display apparatus of claim 1, wherein border regions are located on both sides of the display region. 3. The display apparatus of claim 2, wherein the border regions face each other. 4. The display apparatus of claim 1, wherein the touch region and the touch wirings are bent to correspond to shapes of the display region and the first and second non-display regions. 5. The display apparatus of claim 1, wherein the first non-display region is bent with respect to the display region, and a portion of the first non-display region is bent to face the display region and includes a pad unit. 6. The display apparatus of claim 5, wherein the first non-display region is adjacent to the second non-display region, and wherein corners of the first and the second non-display regions are cut off. 7. A display apparatus comprising: a first protective film; a substrate on the first protective film; a display region on a first plane of the substrate; a first non-display region disposed on a second plane of the substrate, wherein the second plane is bent with respect to the first plane; a second non-display region adjacent to the first non-display region, wherein the second non-display region is disposed on a third plane of the substrate, and wherein the third plane is bent with respect to the first plane; a border region between the display region and the first and second non-display regions, the border region extending from the display region and displaying an image; and an encapsulation member on the display region, wherein corners of the first and the second non-display regions are cut off. 8. The display apparatus of claim 7, wherein a portion of the first non-display region or a portion of the second non-display region is bent to face the display region. 9. The display apparatus of claim 8, wherein the portion of the first non-display region or the portion of the second non-display region includes a pad unit. 10. The display apparatus of claim 9, further comprising a touch region and touch wirings in wiring regions outside the touch region being disposed on the encapsulation member, wherein the touch region is on the display region and the border region, and wherein the touch wirings are on at least one selected from the first non-display region and the second non-display region. 11. The display apparatus of claim 7, further comprising an electrode power supply line located in the first non-display region and the second non-display region. 12. A display apparatus comprising: a first protective film; a substrate on the first protective film; a display region on a first plane of the substrate; a first non-display region disposed on a second plane of the substrate, wherein the second plane is bent with respect to the first plane; a second non-display region adjacent to the first non-display region, wherein the second non-display region is disposed on a third plane of the substrate, and wherein the third plane is bent with respect to the first plane; and an encapsulation member on the display region, wherein a portion of the first non-display region or a portion of the second non-display region is bent to face the display region. 13. The display apparatus of claim 12, wherein the portion of the first non-display region or the portion of the second non-display region includes a pad unit. 14. The display apparatus of claim 12, further comprising a touch region and touch wirings in wiring regions outside the touch region being disposed on the encapsulation member, wherein the touch region is on the display region and the touch wirings are on at least one selected from the first non-display region and the second non-display region. 15. The display apparatus of claim 14, wherein the touch region and the touch wirings are bent to correspond to shapes of the display region and the first and second non-display regions. 16. The display apparatus of claim 12, further comprising a transparent protection window on the encapsulation member. 17. The display apparatus of claim 16, wherein the transparent protection window is disposed on the encapsulation member to correspond to shapes of the display region and the first and second non-display regions. 18. The display apparatus of claim 16, wherein the transparent protection window functions as a support unit for maintaining shapes of the display region and the first and second non-display regions. 19. A display apparatus comprising: a first protective film; a substrate on the first protective film; a display region and a first non-display region on a first plane of the substrate; a second non-display region on a second plane of the substrate, wherein the second plane is bent with respect to the first plane; a border region between the display region and the second non-display region, the border region extending from the display region and displaying an image; and an encapsulation member on the display region, wherein the display region and the border region comprise at least an organic light-emitting device comprising a pixel electrode, an organic emission layer and an opposite electrode, and wherein an electrode power supply line for supplying power to the opposite electrode is located in the second non-display region. 20. A display apparatus comprising: a first protective film; a substrate on the first protective film; a display region and a first non-display region disposed on a first plane of the substrate; a second non-display region disposed on a second plane of the substrate, wherein the second plane is bent with respect to the first plane; a border region between the display region and the second non-display region, the border region extending from the display region and displaying an image; an encapsulation member on the display region; and a transparent protection window on the a encapsulation member, wherein the border region is curved shape, and wherein the transparent protection window is attached to the encapsulation member to correspond to shapes of the of the display region and the first and second non-display region. 21. The display apparatus of claim 20, wherein the transparent protection window functions as a support unit for maintaining shapes of the display region and the first and second non-display regions.
A flexible display panel and a display apparatus including the flexible display panel are disclosed. The flexible display panel includes an encapsulated panel, a first protective film on one side of the encapsulated panel, and a second protective film on another side of the encapsulated panel. The encapsulated panel includes a flexible panel and a flexible encapsulation member on the flexible panel. The flexible panel includes a first region on a first plane and that includes a display region, and a second region on a second plane that is bent with respect to the first plane and that includes a non-display region. The flexible encapsulation member encapsulates the display region. The display apparatus also includes a support unit for maintaining a shape of the flexible panel.1. A display apparatus comprising: a first protective film; a substrate on the first protective film; a display region and a first non-display region disposed on a first plane of the substrate; a second non-display region disposed on a second plane of the substrate, wherein the second plane is bent with respect to the first plane; a border region between the display region and the second non-display region, the border region extending from the display region and displaying an image; an encapsulation member on the display region, the border region and the second non-display region; and a touch region and touch wirings in wiring regions outside the touch region being disposed on the encapsulation member, wherein the touch region is disposed on the display region and the border region, and wherein the touch wirings are disposed on at least one selected from the first non-display region and the second non-display region. 2. The display apparatus of claim 1, wherein border regions are located on both sides of the display region. 3. The display apparatus of claim 2, wherein the border regions face each other. 4. The display apparatus of claim 1, wherein the touch region and the touch wirings are bent to correspond to shapes of the display region and the first and second non-display regions. 5. The display apparatus of claim 1, wherein the first non-display region is bent with respect to the display region, and a portion of the first non-display region is bent to face the display region and includes a pad unit. 6. The display apparatus of claim 5, wherein the first non-display region is adjacent to the second non-display region, and wherein corners of the first and the second non-display regions are cut off. 7. A display apparatus comprising: a first protective film; a substrate on the first protective film; a display region on a first plane of the substrate; a first non-display region disposed on a second plane of the substrate, wherein the second plane is bent with respect to the first plane; a second non-display region adjacent to the first non-display region, wherein the second non-display region is disposed on a third plane of the substrate, and wherein the third plane is bent with respect to the first plane; a border region between the display region and the first and second non-display regions, the border region extending from the display region and displaying an image; and an encapsulation member on the display region, wherein corners of the first and the second non-display regions are cut off. 8. The display apparatus of claim 7, wherein a portion of the first non-display region or a portion of the second non-display region is bent to face the display region. 9. The display apparatus of claim 8, wherein the portion of the first non-display region or the portion of the second non-display region includes a pad unit. 10. The display apparatus of claim 9, further comprising a touch region and touch wirings in wiring regions outside the touch region being disposed on the encapsulation member, wherein the touch region is on the display region and the border region, and wherein the touch wirings are on at least one selected from the first non-display region and the second non-display region. 11. The display apparatus of claim 7, further comprising an electrode power supply line located in the first non-display region and the second non-display region. 12. A display apparatus comprising: a first protective film; a substrate on the first protective film; a display region on a first plane of the substrate; a first non-display region disposed on a second plane of the substrate, wherein the second plane is bent with respect to the first plane; a second non-display region adjacent to the first non-display region, wherein the second non-display region is disposed on a third plane of the substrate, and wherein the third plane is bent with respect to the first plane; and an encapsulation member on the display region, wherein a portion of the first non-display region or a portion of the second non-display region is bent to face the display region. 13. The display apparatus of claim 12, wherein the portion of the first non-display region or the portion of the second non-display region includes a pad unit. 14. The display apparatus of claim 12, further comprising a touch region and touch wirings in wiring regions outside the touch region being disposed on the encapsulation member, wherein the touch region is on the display region and the touch wirings are on at least one selected from the first non-display region and the second non-display region. 15. The display apparatus of claim 14, wherein the touch region and the touch wirings are bent to correspond to shapes of the display region and the first and second non-display regions. 16. The display apparatus of claim 12, further comprising a transparent protection window on the encapsulation member. 17. The display apparatus of claim 16, wherein the transparent protection window is disposed on the encapsulation member to correspond to shapes of the display region and the first and second non-display regions. 18. The display apparatus of claim 16, wherein the transparent protection window functions as a support unit for maintaining shapes of the display region and the first and second non-display regions. 19. A display apparatus comprising: a first protective film; a substrate on the first protective film; a display region and a first non-display region on a first plane of the substrate; a second non-display region on a second plane of the substrate, wherein the second plane is bent with respect to the first plane; a border region between the display region and the second non-display region, the border region extending from the display region and displaying an image; and an encapsulation member on the display region, wherein the display region and the border region comprise at least an organic light-emitting device comprising a pixel electrode, an organic emission layer and an opposite electrode, and wherein an electrode power supply line for supplying power to the opposite electrode is located in the second non-display region. 20. A display apparatus comprising: a first protective film; a substrate on the first protective film; a display region and a first non-display region disposed on a first plane of the substrate; a second non-display region disposed on a second plane of the substrate, wherein the second plane is bent with respect to the first plane; a border region between the display region and the second non-display region, the border region extending from the display region and displaying an image; an encapsulation member on the display region; and a transparent protection window on the a encapsulation member, wherein the border region is curved shape, and wherein the transparent protection window is attached to the encapsulation member to correspond to shapes of the of the display region and the first and second non-display region. 21. The display apparatus of claim 20, wherein the transparent protection window functions as a support unit for maintaining shapes of the display region and the first and second non-display regions.
2,600
344,448
16,803,961
3,792
In an embodiment, a sleep mask is provided, which may include a site (such as a pocket near the center of the forehead), for holding electronical components for implementing a circadian rhythm disorder treatment program. Optionally, the sleep mask may also include one or more holes for locating and securing light pipes that are connected to lights for producing lighting that adjust a user's circadian pattern based on the circadian rhythm disorder treatment program. Optionally, the sleep mask also includes adjustable straps.
1. A system comprising: a sleep mask; the sleep mask including at least one or more sites for installing electronic components, at least two holes for mounting light pipes for shining light on the eyes of a user, and an adjustable strap that is adjustable to different head sizes, ear sizes, and user positions. 2. The system of claim 1, further comprising: a light pipe system including one or more light pipes held in at least the two holes, a first of the two holes being positions so that when a light is activated, the light pipe system illuminates a first of two user eyes, via one of the two holes and a second of the two holes being positioned, so that the light pipe system illuminates a second of two user eyes the second of the two user holes; and electronics installed at the one or more sites, the sites being for holding electronics, the electronics including a controller that controls a light source that is in communication with the light pipe system to produce of pattern of light on a side of the mask that faces the user while the mask is being worn. 3. The system of claim 1, the sleep mask further including two eye covers that cover a user's eyes, when the mask is being worn, a pocket holding electronic components, the pocket being located between the two eye covers. 4. The system of claim 3, wherein the pocket having an opening that allows the electronic components to be removed and reinstalled, such that the pocket holds the electronic components in a desired position, by registering protruding parts of the electronic components in pre-formed holes in the mask. 5. The system of claim 3, wherein the pocket holds the electronic components permanently inside the mask. 6. The system of claim 3, wherein the pocket is located at least partially at a location that covers a top portion of a bridge of a nose of a user when the mask is being worn on the user. 7. The system of claim 3, wherein the pocket is located above a location that covers a bridge of a nose of a user when the mask is on the user. 8. The system of claim 3, wherein the pocket is located closer to a top of a portion of the mask between two eye portions than a bottom of the portion between the two eye portions. 9. The system of claim 1, the mask having two eye portions for covering eyes of the user in which the at least two holes for light pipes are located, each of the two eye portions having at least one hole for at least one light pipe. 10. The system of claim 1, wherein each eye portion includes a cupped region where the holes for the light pipes. 11. The system of claim 1, wherein the distance between a center of each of the at least two holes for the light pips are within the range of 30-150 mm. 12. The system of claim 1, wherein when the mask is worn, the mask includes the light pipes, and an end of the light pipes that face the user are located at a position within a distance of 5-25 mm away from the surface of the user's eyes. 13. The system of claim 1, wherein the make includes the light pipes, and when the mask is worn, an angle in which the center of the light pipe pointing to is between 0 and 72 when the light pipes are located closer to the nose than the ears and between 0 and 86 degrees when the light pipes are located closer to the ears than the nose, from a perpendicular line emanating from pupil openings of the user's eyes, while the user is looking straight ahead, a direction parallel to the line is 0 degrees. 14. The system of claim 1 the adjustable strap including at least two straps; the at least two straps forming at least two loops, wherein at least one loop, which is a left loop, and is attached to a left end of the mask and at least one loop, which is a right loop is attached to a right end of the mask, the mask having a top and a bottom, the top being a portion of the mask that is furthest from the ground when the mask is worn by the user, with light pipes having an exposed surface facing the user so as to illuminate eyes of the user, and the bottom being a portion of the mask that is closest from the ground when mask is worn by the user, with the light pipes having an exposed surface facing the user so as to illuminate eyes of the user, a portion of the mask that attaches the two eye covers is above a nose of the user, and above portions of the eye covers, the eye covers extent below a bottom of the portion bridging the eye covers. 15. The system of claim 14, wherein at least an upper portion of the right loop is attached to a top of the right end of the mask and at least a lower portion of the right loop is attached to a bottom of the right end mask; wherein at least an upper portion of the left loop is attached to a top of the left end of the mask and at least a lower portion of the left loop is attached to a bottom of the left end of the mask; the top being an edge that is above the eye covers and the bottom being a portion that is below the eye covers. 16. The system of claim 14, the left loop having a left loop fastener and the right loop having a right loop fastener; the left loop fastener detachably fastening to the right loop fastener. 17. The system of claim 16, the right loop fastener including a right pad attached to the right loop; the left loop fastener having a left pad attached to the left loop, the left loop fastener adjustably connects to the right pad of the right loop fastener. 18. The system of claim 17, the right pad having hook and loop material, and the left pad having hook and loop material that connects to the hook and loop material on the right pad. 19. The system of claim 14, the left loop being wide enough so that an average person's ear fits in within the left loop with an upper portion of the left loop above a portion of the left ear and a lower portion of the left loop below a portion of the left ear; the right loop being wide enough so that an average person's ear fits in within loop with an upper portion of the right loop above a portion of the right ear and a lower portion of the right loop below a portion of the right ear. 20. The system of claim 1, further comprising the light pipes positioned for illuminating the user's eyes, and one or more or more lights that are positioned to be in optical communication with the light pipes. 21. The system of claim 1 further comprising straps attached to the mask for holding the mask on the face of the user, the straps being configured for being adjusted according to a user's preference. 22. A system comprising: a mask; at least two pads coupled to the mask; and at least two pads that couple to one another in a plurality of locations so as to adjust how the mask fits on a user. 23. The system of claim 22, further comprising: the at least two straps, each of the at least two straps connecting one of the at least two pads to the mask in a stable but adjustable manner, by the at least two straps being connect via channels in the at least two pads to the at least two pads.
In an embodiment, a sleep mask is provided, which may include a site (such as a pocket near the center of the forehead), for holding electronical components for implementing a circadian rhythm disorder treatment program. Optionally, the sleep mask may also include one or more holes for locating and securing light pipes that are connected to lights for producing lighting that adjust a user's circadian pattern based on the circadian rhythm disorder treatment program. Optionally, the sleep mask also includes adjustable straps.1. A system comprising: a sleep mask; the sleep mask including at least one or more sites for installing electronic components, at least two holes for mounting light pipes for shining light on the eyes of a user, and an adjustable strap that is adjustable to different head sizes, ear sizes, and user positions. 2. The system of claim 1, further comprising: a light pipe system including one or more light pipes held in at least the two holes, a first of the two holes being positions so that when a light is activated, the light pipe system illuminates a first of two user eyes, via one of the two holes and a second of the two holes being positioned, so that the light pipe system illuminates a second of two user eyes the second of the two user holes; and electronics installed at the one or more sites, the sites being for holding electronics, the electronics including a controller that controls a light source that is in communication with the light pipe system to produce of pattern of light on a side of the mask that faces the user while the mask is being worn. 3. The system of claim 1, the sleep mask further including two eye covers that cover a user's eyes, when the mask is being worn, a pocket holding electronic components, the pocket being located between the two eye covers. 4. The system of claim 3, wherein the pocket having an opening that allows the electronic components to be removed and reinstalled, such that the pocket holds the electronic components in a desired position, by registering protruding parts of the electronic components in pre-formed holes in the mask. 5. The system of claim 3, wherein the pocket holds the electronic components permanently inside the mask. 6. The system of claim 3, wherein the pocket is located at least partially at a location that covers a top portion of a bridge of a nose of a user when the mask is being worn on the user. 7. The system of claim 3, wherein the pocket is located above a location that covers a bridge of a nose of a user when the mask is on the user. 8. The system of claim 3, wherein the pocket is located closer to a top of a portion of the mask between two eye portions than a bottom of the portion between the two eye portions. 9. The system of claim 1, the mask having two eye portions for covering eyes of the user in which the at least two holes for light pipes are located, each of the two eye portions having at least one hole for at least one light pipe. 10. The system of claim 1, wherein each eye portion includes a cupped region where the holes for the light pipes. 11. The system of claim 1, wherein the distance between a center of each of the at least two holes for the light pips are within the range of 30-150 mm. 12. The system of claim 1, wherein when the mask is worn, the mask includes the light pipes, and an end of the light pipes that face the user are located at a position within a distance of 5-25 mm away from the surface of the user's eyes. 13. The system of claim 1, wherein the make includes the light pipes, and when the mask is worn, an angle in which the center of the light pipe pointing to is between 0 and 72 when the light pipes are located closer to the nose than the ears and between 0 and 86 degrees when the light pipes are located closer to the ears than the nose, from a perpendicular line emanating from pupil openings of the user's eyes, while the user is looking straight ahead, a direction parallel to the line is 0 degrees. 14. The system of claim 1 the adjustable strap including at least two straps; the at least two straps forming at least two loops, wherein at least one loop, which is a left loop, and is attached to a left end of the mask and at least one loop, which is a right loop is attached to a right end of the mask, the mask having a top and a bottom, the top being a portion of the mask that is furthest from the ground when the mask is worn by the user, with light pipes having an exposed surface facing the user so as to illuminate eyes of the user, and the bottom being a portion of the mask that is closest from the ground when mask is worn by the user, with the light pipes having an exposed surface facing the user so as to illuminate eyes of the user, a portion of the mask that attaches the two eye covers is above a nose of the user, and above portions of the eye covers, the eye covers extent below a bottom of the portion bridging the eye covers. 15. The system of claim 14, wherein at least an upper portion of the right loop is attached to a top of the right end of the mask and at least a lower portion of the right loop is attached to a bottom of the right end mask; wherein at least an upper portion of the left loop is attached to a top of the left end of the mask and at least a lower portion of the left loop is attached to a bottom of the left end of the mask; the top being an edge that is above the eye covers and the bottom being a portion that is below the eye covers. 16. The system of claim 14, the left loop having a left loop fastener and the right loop having a right loop fastener; the left loop fastener detachably fastening to the right loop fastener. 17. The system of claim 16, the right loop fastener including a right pad attached to the right loop; the left loop fastener having a left pad attached to the left loop, the left loop fastener adjustably connects to the right pad of the right loop fastener. 18. The system of claim 17, the right pad having hook and loop material, and the left pad having hook and loop material that connects to the hook and loop material on the right pad. 19. The system of claim 14, the left loop being wide enough so that an average person's ear fits in within the left loop with an upper portion of the left loop above a portion of the left ear and a lower portion of the left loop below a portion of the left ear; the right loop being wide enough so that an average person's ear fits in within loop with an upper portion of the right loop above a portion of the right ear and a lower portion of the right loop below a portion of the right ear. 20. The system of claim 1, further comprising the light pipes positioned for illuminating the user's eyes, and one or more or more lights that are positioned to be in optical communication with the light pipes. 21. The system of claim 1 further comprising straps attached to the mask for holding the mask on the face of the user, the straps being configured for being adjusted according to a user's preference. 22. A system comprising: a mask; at least two pads coupled to the mask; and at least two pads that couple to one another in a plurality of locations so as to adjust how the mask fits on a user. 23. The system of claim 22, further comprising: the at least two straps, each of the at least two straps connecting one of the at least two pads to the mask in a stable but adjustable manner, by the at least two straps being connect via channels in the at least two pads to the at least two pads.
3,700
344,449
16,803,947
3,792
Inventive aspects include a device including storage media. The device includes a PMU, and a controller communicatively coupled to the PMU. The PMU determines that an operating power of the device exceeds a threshold, and transmits a signal to the controller to trigger a power reduction operation. The controller throttles one or more operations until the operating power goes below the threshold. Some embodiments include a method for controlling performance of a storage device. The method includes measuring, by a PMU, a power consumption associated with a storage device. The method includes determining, by the PMU, whether the power consumption is greater than a threshold. In response, the method may include setting a performance throttle. The method may include determining, by the PMU, whether the power consumption is less than the threshold. In response, the method may include releasing the performance throttle.
1. A device, comprising: a non-transitory computer-readable storage media; a power metering unit (PMU); and a controller communicatively coupled to the PMU; wherein the PMU is configured to: measure an operating power of the device; determine that the operating power of the device exceeds a threshold; and transmit a signal to the controller to trigger a power reduction operation; and wherein the controller is configured to throttle one or more operations responsive to the signal and dependent on the operating power going below the threshold, wherein: the storage media is associated with a first storage protocol and a second storage protocol; the threshold is a first threshold; the signal is a first signal; the PMU is configured to: determine that the operating power of the device exceeds a second threshold; and transmit a second signal to the controller to trigger the power reduction operation; wherein the controller is configured to throttle the one or more operations associated with the first storage protocol in response to the first signal dependent on the operating power going below the first threshold; and wherein the controller is configured to throttle the one or more operations associated with the second storage protocol in response to the second signal dependent on the operating power going below the second threshold. 2. The device of claim 1, further comprising at least one of 1) a solid state drive (SSD) or 2) a non-volatile storage, including the storage media, the PMU, and the controller, wherein the threshold is a predefined power level threshold associated with the at least one of 1) the SSD or 2) the non-volatile storage. 3. The device of claim 1, wherein the controller includes a dynamic speed control logic section that is configured to dynamically reduce an operating clock speed dependent on the operating power going below the threshold. 4. The device of claim 1, wherein the controller includes a dynamic delay control logic section that is configured to dynamically delay the one or more operations dependent on the operating power going below the threshold. 5. The device of claim 1, wherein the controller is configured to throttle the one or more operations within one or more discrete performance throttling windows. 6. The device of claim 1, wherein the controller is configured to maintain the operating power below a power budget limit. 7. The device of claim 1, wherein the controller is a storage throttle controller. 8. The device of claim 1, wherein the one or more operations includes at least one of a storage write operation or a storage read operation. 9. (canceled) 10. A device, comprising: a storage enclosure including one or more solid state drives (SSDs) each having a non-transitory computer-readable storage media; a power metering unit (PMU); and a storage throttle controller communicatively coupled to the PMU; wherein the PMU is configured to: determine that an operating power of the storage enclosure exceeds a predefined power level threshold; and transmit a signal to the storage throttle controller to trigger a power reduction operation; and wherein the storage throttle controller is configured to throttle one or more operations associated with the storage enclosure dependent on the operating power going below the predefined power level threshold, wherein: a first subset of the SSDs is associated with a first storage protocol; a second subset of the SSDs is associated with a second storage protocol; the threshold is a first threshold; the signal is a first signal; the PMU is configured to: determine that the operating power of the storage enclosure exceeds a second threshold; and transmit a second signal to the storage throttle controller to trigger the power reduction operation; and the storage throttle controller is configured to throttle the one or more operations associated with the first protocol in response to the first signal dependent on the operating power going below the first threshold; and the storage throttle controller is configured to throttle the one or more operations associated with the second protocol in response to the second signal dependent on the operating power going below the second threshold. 11. The device of claim 10, wherein the storage throttle controller includes a dynamic speed control logic section that is configured to dynamically reduce an operating clock speed dependent on the operating power going below the predefined power level threshold. 12. The device of claim 10, wherein the storage throttle controller includes a dynamic delay control logic section that is configured to dynamically delay the one or more operations dependent on the operating power going below the predefined power level threshold. 13. The device of claim 10, wherein the storage throttle controller is configured to maintain the operating power below a power budget limit associated with the storage enclosure. 14. The device of claim 10, wherein the one or more operations includes at least one of a storage write operation or a storage read operation. 15. (canceled) 16. A method for controlling performance of a storage device, the method comprising: measuring, by a power metering unit (PMU), a power consumption associated with the storage device; determining, by the PMU, whether the power consumption is greater than a threshold; in response to determining by the PMU that the power consumption is greater than the threshold, setting a performance throttle; determining, by the PMU, whether the power consumption is less than the threshold; and in response to determining by the PMU that the power consumption is less than the threshold, releasing the performance throttle. 17. The method of claim 16, wherein setting further comprises setting, by a controller, the performance throttle. 18. The method of claim 17, wherein releasing further comprises releasing, by the controller, the performance throttle. 19. The method of claim 16, wherein setting the performance throttle includes dynamically reducing an operating clock speed dependent on the measured power consumption going below the threshold. 20. The method of claim 16, wherein setting the performance throttle includes dynamically delaying one or more operations dependent on the measured power consumption going below the threshold. 21. The device of claim 1, wherein the PMU is configured to: determine that the operating power of the device exceeds a third threshold; and transmit a third signal to the controller to trigger the power reduction operation; wherein the storage media is associated with a third storage protocol; and wherein the controller is configured to throttle the one or more operations associated with the third storage protocol in response to the third signal dependent on the operating power going below the third threshold. 22. The device of claim 21, wherein: the first storage protocol is a non-volatile memory express (NVME) storage protocol; the second storage protocol is a serial attached SCSI (SAS) storage protocol; the third storage protocol is a serial ATA (SATA) storage protocol; and the controller is configured to release a performance throttle in response to determining by the PMU that operating power is less than at least one of the first threshold, the second threshold, or the third threshold.
Inventive aspects include a device including storage media. The device includes a PMU, and a controller communicatively coupled to the PMU. The PMU determines that an operating power of the device exceeds a threshold, and transmits a signal to the controller to trigger a power reduction operation. The controller throttles one or more operations until the operating power goes below the threshold. Some embodiments include a method for controlling performance of a storage device. The method includes measuring, by a PMU, a power consumption associated with a storage device. The method includes determining, by the PMU, whether the power consumption is greater than a threshold. In response, the method may include setting a performance throttle. The method may include determining, by the PMU, whether the power consumption is less than the threshold. In response, the method may include releasing the performance throttle.1. A device, comprising: a non-transitory computer-readable storage media; a power metering unit (PMU); and a controller communicatively coupled to the PMU; wherein the PMU is configured to: measure an operating power of the device; determine that the operating power of the device exceeds a threshold; and transmit a signal to the controller to trigger a power reduction operation; and wherein the controller is configured to throttle one or more operations responsive to the signal and dependent on the operating power going below the threshold, wherein: the storage media is associated with a first storage protocol and a second storage protocol; the threshold is a first threshold; the signal is a first signal; the PMU is configured to: determine that the operating power of the device exceeds a second threshold; and transmit a second signal to the controller to trigger the power reduction operation; wherein the controller is configured to throttle the one or more operations associated with the first storage protocol in response to the first signal dependent on the operating power going below the first threshold; and wherein the controller is configured to throttle the one or more operations associated with the second storage protocol in response to the second signal dependent on the operating power going below the second threshold. 2. The device of claim 1, further comprising at least one of 1) a solid state drive (SSD) or 2) a non-volatile storage, including the storage media, the PMU, and the controller, wherein the threshold is a predefined power level threshold associated with the at least one of 1) the SSD or 2) the non-volatile storage. 3. The device of claim 1, wherein the controller includes a dynamic speed control logic section that is configured to dynamically reduce an operating clock speed dependent on the operating power going below the threshold. 4. The device of claim 1, wherein the controller includes a dynamic delay control logic section that is configured to dynamically delay the one or more operations dependent on the operating power going below the threshold. 5. The device of claim 1, wherein the controller is configured to throttle the one or more operations within one or more discrete performance throttling windows. 6. The device of claim 1, wherein the controller is configured to maintain the operating power below a power budget limit. 7. The device of claim 1, wherein the controller is a storage throttle controller. 8. The device of claim 1, wherein the one or more operations includes at least one of a storage write operation or a storage read operation. 9. (canceled) 10. A device, comprising: a storage enclosure including one or more solid state drives (SSDs) each having a non-transitory computer-readable storage media; a power metering unit (PMU); and a storage throttle controller communicatively coupled to the PMU; wherein the PMU is configured to: determine that an operating power of the storage enclosure exceeds a predefined power level threshold; and transmit a signal to the storage throttle controller to trigger a power reduction operation; and wherein the storage throttle controller is configured to throttle one or more operations associated with the storage enclosure dependent on the operating power going below the predefined power level threshold, wherein: a first subset of the SSDs is associated with a first storage protocol; a second subset of the SSDs is associated with a second storage protocol; the threshold is a first threshold; the signal is a first signal; the PMU is configured to: determine that the operating power of the storage enclosure exceeds a second threshold; and transmit a second signal to the storage throttle controller to trigger the power reduction operation; and the storage throttle controller is configured to throttle the one or more operations associated with the first protocol in response to the first signal dependent on the operating power going below the first threshold; and the storage throttle controller is configured to throttle the one or more operations associated with the second protocol in response to the second signal dependent on the operating power going below the second threshold. 11. The device of claim 10, wherein the storage throttle controller includes a dynamic speed control logic section that is configured to dynamically reduce an operating clock speed dependent on the operating power going below the predefined power level threshold. 12. The device of claim 10, wherein the storage throttle controller includes a dynamic delay control logic section that is configured to dynamically delay the one or more operations dependent on the operating power going below the predefined power level threshold. 13. The device of claim 10, wherein the storage throttle controller is configured to maintain the operating power below a power budget limit associated with the storage enclosure. 14. The device of claim 10, wherein the one or more operations includes at least one of a storage write operation or a storage read operation. 15. (canceled) 16. A method for controlling performance of a storage device, the method comprising: measuring, by a power metering unit (PMU), a power consumption associated with the storage device; determining, by the PMU, whether the power consumption is greater than a threshold; in response to determining by the PMU that the power consumption is greater than the threshold, setting a performance throttle; determining, by the PMU, whether the power consumption is less than the threshold; and in response to determining by the PMU that the power consumption is less than the threshold, releasing the performance throttle. 17. The method of claim 16, wherein setting further comprises setting, by a controller, the performance throttle. 18. The method of claim 17, wherein releasing further comprises releasing, by the controller, the performance throttle. 19. The method of claim 16, wherein setting the performance throttle includes dynamically reducing an operating clock speed dependent on the measured power consumption going below the threshold. 20. The method of claim 16, wherein setting the performance throttle includes dynamically delaying one or more operations dependent on the measured power consumption going below the threshold. 21. The device of claim 1, wherein the PMU is configured to: determine that the operating power of the device exceeds a third threshold; and transmit a third signal to the controller to trigger the power reduction operation; wherein the storage media is associated with a third storage protocol; and wherein the controller is configured to throttle the one or more operations associated with the third storage protocol in response to the third signal dependent on the operating power going below the third threshold. 22. The device of claim 21, wherein: the first storage protocol is a non-volatile memory express (NVME) storage protocol; the second storage protocol is a serial attached SCSI (SAS) storage protocol; the third storage protocol is a serial ATA (SATA) storage protocol; and the controller is configured to release a performance throttle in response to determining by the PMU that operating power is less than at least one of the first threshold, the second threshold, or the third threshold.
3,700
344,450
16,803,957
1,699
A method of preparing a polyvinyl alcohol nanofiber membrane includes a material for controlling cell specific adhesion, and a nanofiber membrane that can maintain cellular functions such as cell activity and growth is prepared by adding aqueous solutions containing a polyacrylic acid and a glutaraldehyde crosslinking agent in a polyvinyl alcohol and materials capable of enhancing or regulating cell adhesion, electrospinning, treating with hydrochloric acid vapor and dimethylformaldehyde solvent and treating with sodium hydroxide to control the cell adhesion.
1. A method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion, comprising: (1) preparing polyvinyl alcohol nanofiber membrane by adding cell-adhesive material to an electrospinning solution containing polyvinyl alcohol (PVA), polyacrylic acid (PAA) and glutaraldehyde (GA) and electrospinning; (2) cross-linking the polyvinyl alcohol nanofiber membrane by hydrochloric acid (HCl) vapor treatment, followed by crystallization by treating with dimethylformamide (DMF) solvent; and (3) treating crystallized polyvinyl alcohol nanofiber membrane with sodium hydroxide. 2. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 1, wherein the cell-adhesive material is a cell-binding peptide or fucoidan. 3. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 2, wherein the cell-binding peptide is any one or more peptides selected from the group consisting of RGD peptides, KGRGDS peptides, GGPEILDVPST peptides and YIGSR peptides. 4. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 1, wherein the cell is epithelial cells, vascular epithelial cells, cancer cells, fibroblasts, hepatocytes, immune cells or stromal cells. 5. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 2, wherein the cell-binding peptide is added at a concentration of 10 to 300 μg/mL. 6. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 2, wherein the fucoidan is added at a concentration of 1 to 20 mg/m L. 7. A polyvinyl alcohol nanofiber membrane with enhanced cell adhesion prepared by the method of claim 1. 8. A three-dimensional cell culture method with enhanced cell adhesion comprising three-dimensionally culturing cells in the polyvinyl alcohol nanofiber membrane of claim 7. 9. The three-dimensional cell culture method with enhanced cell adhesion of claim 8, wherein the cells are epithelial cells, vascular epithelial cells, cancer cells, fibroblasts, hepatocytes, immune cells or stromal cells.
A method of preparing a polyvinyl alcohol nanofiber membrane includes a material for controlling cell specific adhesion, and a nanofiber membrane that can maintain cellular functions such as cell activity and growth is prepared by adding aqueous solutions containing a polyacrylic acid and a glutaraldehyde crosslinking agent in a polyvinyl alcohol and materials capable of enhancing or regulating cell adhesion, electrospinning, treating with hydrochloric acid vapor and dimethylformaldehyde solvent and treating with sodium hydroxide to control the cell adhesion.1. A method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion, comprising: (1) preparing polyvinyl alcohol nanofiber membrane by adding cell-adhesive material to an electrospinning solution containing polyvinyl alcohol (PVA), polyacrylic acid (PAA) and glutaraldehyde (GA) and electrospinning; (2) cross-linking the polyvinyl alcohol nanofiber membrane by hydrochloric acid (HCl) vapor treatment, followed by crystallization by treating with dimethylformamide (DMF) solvent; and (3) treating crystallized polyvinyl alcohol nanofiber membrane with sodium hydroxide. 2. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 1, wherein the cell-adhesive material is a cell-binding peptide or fucoidan. 3. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 2, wherein the cell-binding peptide is any one or more peptides selected from the group consisting of RGD peptides, KGRGDS peptides, GGPEILDVPST peptides and YIGSR peptides. 4. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 1, wherein the cell is epithelial cells, vascular epithelial cells, cancer cells, fibroblasts, hepatocytes, immune cells or stromal cells. 5. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 2, wherein the cell-binding peptide is added at a concentration of 10 to 300 μg/mL. 6. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 2, wherein the fucoidan is added at a concentration of 1 to 20 mg/m L. 7. A polyvinyl alcohol nanofiber membrane with enhanced cell adhesion prepared by the method of claim 1. 8. A three-dimensional cell culture method with enhanced cell adhesion comprising three-dimensionally culturing cells in the polyvinyl alcohol nanofiber membrane of claim 7. 9. The three-dimensional cell culture method with enhanced cell adhesion of claim 8, wherein the cells are epithelial cells, vascular epithelial cells, cancer cells, fibroblasts, hepatocytes, immune cells or stromal cells.
1,600
344,451
16,803,946
1,699
A method of preparing a polyvinyl alcohol nanofiber membrane includes a material for controlling cell specific adhesion, and a nanofiber membrane that can maintain cellular functions such as cell activity and growth is prepared by adding aqueous solutions containing a polyacrylic acid and a glutaraldehyde crosslinking agent in a polyvinyl alcohol and materials capable of enhancing or regulating cell adhesion, electrospinning, treating with hydrochloric acid vapor and dimethylformaldehyde solvent and treating with sodium hydroxide to control the cell adhesion.
1. A method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion, comprising: (1) preparing polyvinyl alcohol nanofiber membrane by adding cell-adhesive material to an electrospinning solution containing polyvinyl alcohol (PVA), polyacrylic acid (PAA) and glutaraldehyde (GA) and electrospinning; (2) cross-linking the polyvinyl alcohol nanofiber membrane by hydrochloric acid (HCl) vapor treatment, followed by crystallization by treating with dimethylformamide (DMF) solvent; and (3) treating crystallized polyvinyl alcohol nanofiber membrane with sodium hydroxide. 2. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 1, wherein the cell-adhesive material is a cell-binding peptide or fucoidan. 3. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 2, wherein the cell-binding peptide is any one or more peptides selected from the group consisting of RGD peptides, KGRGDS peptides, GGPEILDVPST peptides and YIGSR peptides. 4. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 1, wherein the cell is epithelial cells, vascular epithelial cells, cancer cells, fibroblasts, hepatocytes, immune cells or stromal cells. 5. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 2, wherein the cell-binding peptide is added at a concentration of 10 to 300 μg/mL. 6. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 2, wherein the fucoidan is added at a concentration of 1 to 20 mg/m L. 7. A polyvinyl alcohol nanofiber membrane with enhanced cell adhesion prepared by the method of claim 1. 8. A three-dimensional cell culture method with enhanced cell adhesion comprising three-dimensionally culturing cells in the polyvinyl alcohol nanofiber membrane of claim 7. 9. The three-dimensional cell culture method with enhanced cell adhesion of claim 8, wherein the cells are epithelial cells, vascular epithelial cells, cancer cells, fibroblasts, hepatocytes, immune cells or stromal cells.
A method of preparing a polyvinyl alcohol nanofiber membrane includes a material for controlling cell specific adhesion, and a nanofiber membrane that can maintain cellular functions such as cell activity and growth is prepared by adding aqueous solutions containing a polyacrylic acid and a glutaraldehyde crosslinking agent in a polyvinyl alcohol and materials capable of enhancing or regulating cell adhesion, electrospinning, treating with hydrochloric acid vapor and dimethylformaldehyde solvent and treating with sodium hydroxide to control the cell adhesion.1. A method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion, comprising: (1) preparing polyvinyl alcohol nanofiber membrane by adding cell-adhesive material to an electrospinning solution containing polyvinyl alcohol (PVA), polyacrylic acid (PAA) and glutaraldehyde (GA) and electrospinning; (2) cross-linking the polyvinyl alcohol nanofiber membrane by hydrochloric acid (HCl) vapor treatment, followed by crystallization by treating with dimethylformamide (DMF) solvent; and (3) treating crystallized polyvinyl alcohol nanofiber membrane with sodium hydroxide. 2. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 1, wherein the cell-adhesive material is a cell-binding peptide or fucoidan. 3. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 2, wherein the cell-binding peptide is any one or more peptides selected from the group consisting of RGD peptides, KGRGDS peptides, GGPEILDVPST peptides and YIGSR peptides. 4. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 1, wherein the cell is epithelial cells, vascular epithelial cells, cancer cells, fibroblasts, hepatocytes, immune cells or stromal cells. 5. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 2, wherein the cell-binding peptide is added at a concentration of 10 to 300 μg/mL. 6. The method of preparing polyvinyl alcohol nanofiber membrane having enhanced cell adhesion of claim 2, wherein the fucoidan is added at a concentration of 1 to 20 mg/m L. 7. A polyvinyl alcohol nanofiber membrane with enhanced cell adhesion prepared by the method of claim 1. 8. A three-dimensional cell culture method with enhanced cell adhesion comprising three-dimensionally culturing cells in the polyvinyl alcohol nanofiber membrane of claim 7. 9. The three-dimensional cell culture method with enhanced cell adhesion of claim 8, wherein the cells are epithelial cells, vascular epithelial cells, cancer cells, fibroblasts, hepatocytes, immune cells or stromal cells.
1,600
344,452
16,803,943
1,699
Embodiments of the present disclosure provide a method and a device for evaluating a comment quality, an electronic device, and a computer readable storage medium. The method includes: selecting a metadata key associated with a comment of an object from metadata of the object, the metadata including a plurality of key-value pairs; determining a value corresponding to the metadata key based on the metadata; and evaluating the comment quality based on the comment and the value corresponding to the metadata key.
1. A method for evaluating a comment quality, comprising: selecting a metadata key associated with a comment of an object from metadata of the object, the metadata comprising a plurality of key-value pairs; determining a value corresponding to the metadata key based on the metadata; and evaluating the comment quality based on the comment and the value corresponding to the metadata key. 2. The method according to claim 1, wherein selecting the metadata key comprises: generating a first vector of the comment by converting each word or phrase in the comment into a word vector; generating a second vector of the metadata by converting each metadata key in the metadata to a predetermined dimension vector; determining a relevance of each metadata key in the metadata to the comment based on the first vector and the second vector; and selecting a metadata key having a maximum relevance to the comment from the metadata. 3. The method according to claim 2, wherein evaluating the quality of the comment, comprises: generating a third vector of the value corresponding to the metadata key; and determining the comment quality based on the third vector and the first vector. 4. The method according to claim 3, wherein determining the comment quality comprises: determining a score of the comment based on the third vector and the first vector; determining that the comment has a high quality in response to determining that the score is greater than a first threshold; and determining that the comment has a low quality in response to determining that the score is less than a second threshold, wherein the first threshold is greater than or equal to the second threshold. 5. The method according to claim 1, wherein selecting the metadata key and determining the value are performed by a selector model, and evaluating the comment quality is performed by a predictor model, and the method further comprises: simultaneously training the selector model and the predictor model by a training set, wherein the training set comprises a plurality of comments and annotated data indicating a quality of each comment. 6. The method according to claim 5, wherein training the selector model and the predictor model comprises: initiating parameters of each of the selector model and the predictor model; inputting a first comment in the training set and first metadata corresponding to the first comment into the selector model to select a first metadata key; inputting the first comment and a first value corresponding to the first metadata key into the predictor model to generate a first prediction result; optimizing the predictor model based on a predicted loss between the first prediction result and first annotated data of the first comment; determining whether to give the selector model a reward based on a performance of the predictor model; and optimizing the selector model by using the reward in response to determining to give the selector model the reward. 7. The method according to claim 6, wherein, optimizing the predictor model comprises: optimizing the predictor model by a stochastic gradient descent method; and optimizing the selector model comprises: optimizing the selector model by a policy gradient method. 8. The method according to claim 5, wherein the annotated data comprises voting data of the comment fetched from network, and the voting data is provided by a plurality of network users. 9. A device for evaluating a comment quality, comprising: one or more processors; and a storage device, configured to store one or more programs, wherein when the one or more programs are executed by the one or more processors, the one or more processors are configured to: select a metadata key associated with a comment of an object from metadata of the object, the metadata comprising a plurality of key-value pair; determine a value corresponding to the metadata key based on the metadata; and evaluate the comment quality based on the comment and the value corresponding to the metadata key. 10. The device according to claim 9, wherein the one or more processors are further configured to: generate a first vector of the comment by converting each word or phrase in the comment into a word vector; generate a second vector of the metadata by converting each metadata key in the metadata to a predetermined dimension vector; determine a relevance of each metadata key in the metadata to the comment based on the first vector and the second vector; and select a metadata key having a maximum relevance to the comment from the metadata. 11. The device according to claim 10, wherein the one or more processors are further configured to: generate a third vector of the value corresponding to the metadata key; and determine the comment quality based on the third vector and the first vector. 12. The device according to claim 11, wherein the one or more processors are further configured to: determine a score of the comment based on the third vector and the first vector; determine that the comment has a high quality in response to determining that the score is greater than a first threshold; and determine that the comment has a low quality in response to determining that the score is less than a second threshold, wherein the first threshold is greater than or equal to the second threshold. 13. The device according to claim 9, wherein the device further comprises: a training module, configured to simultaneously train a selector model and a predictor model by a training set, wherein the training set comprises a plurality of comments and annotated data indicating a quality of each comment. 14. The device according to claim 13, wherein the one or more processors are further configured to: initiate parameters of each of the selector model and the predictor model; input a first comment in the training set and first metadata corresponding to the first comment into the selector model to select a first metadata key; input the first comment and a first value corresponding to the first metadata key into the predictor model to generate a first prediction result; optimize the predictor model based on a predicted loss between the first prediction result and first annotated data of the first comment; determine whether to give the selector model a reward based on a performance of the predictor model; and optimize the selector model by using the reward in response to determining to give the selector model the reward. 15. The device according to claim 14, wherein the one or more processors are configured to: optimize the predictor model by a stochastic gradient descent method; and optimize the selector model, comprises: optimizing the selector model by a policy-gradient method. 16. The device according to claim 13, wherein the annotated data comprises voting data of the comment fetched from network, and the voting data is provided by a plurality of network users. 17. A non-transitory computer readable storage medium having stored thereon a computer program that, when executed by a processor, cause a method for evaluating a comment quality to be implemented, the method comprising: selecting a metadata key associated with a comment of an object from metadata of the object, the metadata comprising a plurality of key-value pairs; determining a value corresponding to the metadata key based on the metadata; and evaluating the comment quality based on the comment and the value corresponding to the metadata key. 18. The non-transitory computer readable storage medium according to claim 17, wherein selecting the metadata key comprises: generating a first vector of the comment by converting each word or phrase in the comment into a word vector; generating a second vector of the metadata by converting each metadata key in the metadata to a predetermined dimension vector; determining a relevance of each metadata key in the metadata to the comment based on the first vector and the second vector; and selecting a metadata key having a maximum relevance to the comment from the metadata. 19. The non-transitory computer readable storage medium according to claim 18, wherein evaluating the quality of the comment, comprises: generating a third vector of the value corresponding to the metadata key; and determining the comment quality based on the third vector and the first vector. 20. The non-transitory computer readable storage medium according to claim 19, wherein determining the comment quality comprises: determining a score of the comment based on the third vector and the first vector; determining that the comment has a high quality in response to determining that the score is greater than a first threshold; and determining that the comment has a low quality in response to determining that the score is less than a second threshold, wherein the first threshold is greater than or equal to the second threshold.
Embodiments of the present disclosure provide a method and a device for evaluating a comment quality, an electronic device, and a computer readable storage medium. The method includes: selecting a metadata key associated with a comment of an object from metadata of the object, the metadata including a plurality of key-value pairs; determining a value corresponding to the metadata key based on the metadata; and evaluating the comment quality based on the comment and the value corresponding to the metadata key.1. A method for evaluating a comment quality, comprising: selecting a metadata key associated with a comment of an object from metadata of the object, the metadata comprising a plurality of key-value pairs; determining a value corresponding to the metadata key based on the metadata; and evaluating the comment quality based on the comment and the value corresponding to the metadata key. 2. The method according to claim 1, wherein selecting the metadata key comprises: generating a first vector of the comment by converting each word or phrase in the comment into a word vector; generating a second vector of the metadata by converting each metadata key in the metadata to a predetermined dimension vector; determining a relevance of each metadata key in the metadata to the comment based on the first vector and the second vector; and selecting a metadata key having a maximum relevance to the comment from the metadata. 3. The method according to claim 2, wherein evaluating the quality of the comment, comprises: generating a third vector of the value corresponding to the metadata key; and determining the comment quality based on the third vector and the first vector. 4. The method according to claim 3, wherein determining the comment quality comprises: determining a score of the comment based on the third vector and the first vector; determining that the comment has a high quality in response to determining that the score is greater than a first threshold; and determining that the comment has a low quality in response to determining that the score is less than a second threshold, wherein the first threshold is greater than or equal to the second threshold. 5. The method according to claim 1, wherein selecting the metadata key and determining the value are performed by a selector model, and evaluating the comment quality is performed by a predictor model, and the method further comprises: simultaneously training the selector model and the predictor model by a training set, wherein the training set comprises a plurality of comments and annotated data indicating a quality of each comment. 6. The method according to claim 5, wherein training the selector model and the predictor model comprises: initiating parameters of each of the selector model and the predictor model; inputting a first comment in the training set and first metadata corresponding to the first comment into the selector model to select a first metadata key; inputting the first comment and a first value corresponding to the first metadata key into the predictor model to generate a first prediction result; optimizing the predictor model based on a predicted loss between the first prediction result and first annotated data of the first comment; determining whether to give the selector model a reward based on a performance of the predictor model; and optimizing the selector model by using the reward in response to determining to give the selector model the reward. 7. The method according to claim 6, wherein, optimizing the predictor model comprises: optimizing the predictor model by a stochastic gradient descent method; and optimizing the selector model comprises: optimizing the selector model by a policy gradient method. 8. The method according to claim 5, wherein the annotated data comprises voting data of the comment fetched from network, and the voting data is provided by a plurality of network users. 9. A device for evaluating a comment quality, comprising: one or more processors; and a storage device, configured to store one or more programs, wherein when the one or more programs are executed by the one or more processors, the one or more processors are configured to: select a metadata key associated with a comment of an object from metadata of the object, the metadata comprising a plurality of key-value pair; determine a value corresponding to the metadata key based on the metadata; and evaluate the comment quality based on the comment and the value corresponding to the metadata key. 10. The device according to claim 9, wherein the one or more processors are further configured to: generate a first vector of the comment by converting each word or phrase in the comment into a word vector; generate a second vector of the metadata by converting each metadata key in the metadata to a predetermined dimension vector; determine a relevance of each metadata key in the metadata to the comment based on the first vector and the second vector; and select a metadata key having a maximum relevance to the comment from the metadata. 11. The device according to claim 10, wherein the one or more processors are further configured to: generate a third vector of the value corresponding to the metadata key; and determine the comment quality based on the third vector and the first vector. 12. The device according to claim 11, wherein the one or more processors are further configured to: determine a score of the comment based on the third vector and the first vector; determine that the comment has a high quality in response to determining that the score is greater than a first threshold; and determine that the comment has a low quality in response to determining that the score is less than a second threshold, wherein the first threshold is greater than or equal to the second threshold. 13. The device according to claim 9, wherein the device further comprises: a training module, configured to simultaneously train a selector model and a predictor model by a training set, wherein the training set comprises a plurality of comments and annotated data indicating a quality of each comment. 14. The device according to claim 13, wherein the one or more processors are further configured to: initiate parameters of each of the selector model and the predictor model; input a first comment in the training set and first metadata corresponding to the first comment into the selector model to select a first metadata key; input the first comment and a first value corresponding to the first metadata key into the predictor model to generate a first prediction result; optimize the predictor model based on a predicted loss between the first prediction result and first annotated data of the first comment; determine whether to give the selector model a reward based on a performance of the predictor model; and optimize the selector model by using the reward in response to determining to give the selector model the reward. 15. The device according to claim 14, wherein the one or more processors are configured to: optimize the predictor model by a stochastic gradient descent method; and optimize the selector model, comprises: optimizing the selector model by a policy-gradient method. 16. The device according to claim 13, wherein the annotated data comprises voting data of the comment fetched from network, and the voting data is provided by a plurality of network users. 17. A non-transitory computer readable storage medium having stored thereon a computer program that, when executed by a processor, cause a method for evaluating a comment quality to be implemented, the method comprising: selecting a metadata key associated with a comment of an object from metadata of the object, the metadata comprising a plurality of key-value pairs; determining a value corresponding to the metadata key based on the metadata; and evaluating the comment quality based on the comment and the value corresponding to the metadata key. 18. The non-transitory computer readable storage medium according to claim 17, wherein selecting the metadata key comprises: generating a first vector of the comment by converting each word or phrase in the comment into a word vector; generating a second vector of the metadata by converting each metadata key in the metadata to a predetermined dimension vector; determining a relevance of each metadata key in the metadata to the comment based on the first vector and the second vector; and selecting a metadata key having a maximum relevance to the comment from the metadata. 19. The non-transitory computer readable storage medium according to claim 18, wherein evaluating the quality of the comment, comprises: generating a third vector of the value corresponding to the metadata key; and determining the comment quality based on the third vector and the first vector. 20. The non-transitory computer readable storage medium according to claim 19, wherein determining the comment quality comprises: determining a score of the comment based on the third vector and the first vector; determining that the comment has a high quality in response to determining that the score is greater than a first threshold; and determining that the comment has a low quality in response to determining that the score is less than a second threshold, wherein the first threshold is greater than or equal to the second threshold.
1,600
344,453
16,803,873
1,699
Provided by the present disclosure are a method and an apparatus for printing a relational graph. The method for printing a relational graph includes: determining whether an overall view of a to-be-printed relational graph exceeds a set print size; in response to the overall view of a to-be-printed relational graph exceeding the set print size, clustering nodes in the to-be-printed relational graph according to the print size and attribute information of the nodes to form a clustered overall view of the relational graph and subviews of the relational graph; and printing the clustered overall view of the relational graph after the clustering and subviews formed based on the clustered nodes. At least one embodiment of the present disclosure can automatically split a relational graph into pages for printing.
1. A method for printing a relational graph, comprising: determining whether an overall view of a to-be-printed relational graph exceeds a set print size; in response to the overall view of the to-be-printed relational graph exceeding the set print size, clustering nodes in the to-be-printed relational graph according to the print size and attribute information of the nodes to form a clustered overall view of the relational graph and subviews of the relational graph; and printing the clustered overall view of the relational graph after the clustering and subviews formed based on the clustered nodes. 2. The method according to claim 1, further comprising: in the overall view of the to-be-printed relational graph, scaling down regions corresponding to respective clusters of nodes obtained by the clustering to obtain the clustered overall view of the relational graph after the clustering; or in the overall view of the to-be-printed relational graph, displaying each cluster of nodes obtained by the clustering as a node to obtain the clustered overall view of the relational graph after the clustering. 3. The method according to claim 1, wherein printing the subviews formed by the clustered nodes comprises, for each cluster of nodes obtained by clustering: in response to a subview formed by the cluster of nodes is within the range of the print size, printing the subview formed by the cluster of nodes; and in response to the subview formed by the cluster of nodes exceeds the print size, re-clustering the cluster of nodes according to attribute information of the cluster of nodes to obtain clusters of next-level nodes, so that a subview formed by the cluster of nodes after the re-clustering is within the range of the print size; and printing the subview formed by the cluster of nodes after the re-clustering. 4. The method according to claim 3, further comprising: in the subview formed by the cluster of nodes, scaling down regions corresponding to clusters of next-level nodes obtained by the re-clustering to obtain a subview formed by the cluster of nodes after the re-clustering; or in the subview formed by the cluster of nodes, displaying each cluster of next-level nodes obtained by the re-clustering as a node to obtain a subview of the cluster of nodes after the re-clustering. 5. The method according to claim 3, further comprising: printing subviews formed by the cluster of next-level nodes after the re-clustering. 6. The method according to claim 5, further comprising: in response to the subview formed by the cluster of next-level nodes exceeds the print size, re-clustering the cluster of next-level nodes according to attribute information of the cluster of next-level nodes to obtain clusters of further next-level nodes, so that a re-clustered subview formed by the cluster of next-level nodes after the re-clustering is within the range of the print size. 7. The method according to claim 1, wherein the subviews formed by the clustered nodes comprise: subviews formed by clusters of nodes obtained by clustering, wherein a subview formed by a cluster of nodes is a maximal connected subgraph comprising this cluster of nodes. 8. An apparatus for printing a relational graph, comprising: a memory storing a set of instructions; and at least one processor configured to execute the set of instructions to cause the apparatus to perform: determining whether an overall view of a to-be-printed relational graph exceeds a set print size; in response to the overall view of the to-be-printed relational graph exceeding the set print size, clustering nodes in the to-be-printed relational graph according to the print size and attribute information of the nodes to form a clustered overall view of the relational graph and subviews of the relational graph; and printing the clustered overall view of the relational graph after the clustering and subviews formed based on the clustered nodes. 9. The apparatus according to claim 8, wherein the at least one processor is further configured to execute the set of instructions to cause the apparatus to perform: in the overall view of the to-be-printed relational graph, scaling down regions corresponding to respective clusters of nodes obtained by the clustering to obtain the clustered overall view of the relational graph after the clustering; or in the overall view of the to-be-printed relational graph, displaying each cluster of nodes obtained by the clustering as a node to obtain the clustered overall view of the relational graph after the clustering. 10. The apparatus according to claim 8, wherein the at least one processor is further configured to execute the set of instructions to cause the apparatus to perform: for each cluster of nodes obtained by clustering, in response to a subview formed by the cluster of nodes is within the range of the print size, printing the subview formed by the cluster of nodes; and in response to the subview formed by the cluster of nodes exceeds the print size, re-clustering the cluster of nodes according to attribute information of the cluster of nodes to obtain clusters of next-level nodes, so that a subview formed by the cluster of nodes after the re-clustering is within the range of the print size; and printing the subview formed by the cluster of nodes after the re-clustering. 11. The apparatus according to claim 10, wherein the at least one processor is further configured to execute the set of instructions to cause the apparatus to perform: in the subview formed by the cluster of nodes, scaling down regions corresponding to clusters of next-level nodes obtained by the re-clustering to obtain a subview formed by the cluster of nodes after the re-clustering; or in the subview formed by the cluster of nodes, displaying each cluster of next-level nodes obtained by the re-clustering as a node to obtain a subview of the cluster of nodes after the re-clustering. 12. The apparatus according to claim 10, wherein the at least one processor is further configured to execute the set of instructions to cause the apparatus to perform: printing subviews formed by the cluster of next-level nodes after the re-clustering. 13. The apparatus according to claim 8, wherein the subviews formed by the clustered nodes comprise: subviews formed by clusters of nodes obtained by clustering, wherein a subview formed by a cluster of nodes is a maximal connected subgraph comprising this cluster of nodes. 14. A non-transitory computer readable storage medium storing a set of instructions that are executable by one or more processing devices to cause a computer to perform a method for printing a relational graph, the method comprising: determining whether an overall view of a to-be-printed relational graph exceeds a set print size; in response to the overall view of a to-be-printed relational graph exceeding the set print size, clustering nodes in the to-be-printed relational graph according to the print size and attribute information of the nodes to form a clustered overall view of the relational graph and subviews of the relational graph; and printing the clustered overall view of the relational graph after the clustering and subviews formed based on the clustered nodes. 15. The non-transitory computer readable storage medium according to claim 14, wherein the method further comprises: in the overall view of the to-be-printed relational graph, scaling down regions corresponding to respective clusters of nodes obtained by the clustering to obtain the clustered overall view of the relational graph after the clustering; or in the overall view of the to-be-printed relational graph, displaying each cluster of nodes obtained by the clustering as a node to obtain the clustered overall view of the relational graph after the clustering. 16. The non-transitory computer readable storage medium according to claim 14, wherein printing the subviews formed by the clustered nodes comprises, for each cluster of nodes obtained by clustering: in response to a subview formed by the cluster of nodes is within the range of the print size, printing the subview formed by the cluster of nodes; and in response to the subview formed by the cluster of nodes exceeds the print size, re-clustering the cluster of nodes according to attribute information of the cluster of nodes to obtain clusters of next-level nodes, so that a subview formed by the cluster of nodes after the re-clustering is within the range of the print size; and printing the subview formed by the cluster of nodes after the re-clustering. 17. The non-transitory computer readable storage medium according to claim 16, wherein the method further comprises: in the subview formed by the cluster of nodes, scaling down regions corresponding to clusters of next-level nodes obtained by the re-clustering to obtain a subview formed by the cluster of nodes after the re-clustering; or in the subview formed by the cluster of nodes, displaying each cluster of next-level nodes obtained by the re-clustering as a node to obtain a subview of the cluster of nodes after the re-clustering. 18. The non-transitory computer readable storage medium according to claim 16, wherein the method further comprises: printing subviews formed by the cluster of next-level nodes after the re-clustering. 19. The non-transitory computer readable storage medium according to claim 18, wherein the method further comprises: in response to the subview formed by the cluster of next-level nodes exceeding the print size, re-clustering the cluster of next-level nodes according to attribute information of the cluster of next-level nodes to obtain clusters of further next-level nodes, so that a re-clustered subview formed by the cluster of next-level nodes after the re-clustering is within the range of the print size. 20. The non-transitory computer readable storage medium according to claim 14, wherein the subviews formed by the clustered nodes comprise: subviews formed by clusters of nodes obtained by clustering, wherein a subview formed by a cluster of nodes is a maximal connected subgraph comprising this cluster of nodes.
Provided by the present disclosure are a method and an apparatus for printing a relational graph. The method for printing a relational graph includes: determining whether an overall view of a to-be-printed relational graph exceeds a set print size; in response to the overall view of a to-be-printed relational graph exceeding the set print size, clustering nodes in the to-be-printed relational graph according to the print size and attribute information of the nodes to form a clustered overall view of the relational graph and subviews of the relational graph; and printing the clustered overall view of the relational graph after the clustering and subviews formed based on the clustered nodes. At least one embodiment of the present disclosure can automatically split a relational graph into pages for printing.1. A method for printing a relational graph, comprising: determining whether an overall view of a to-be-printed relational graph exceeds a set print size; in response to the overall view of the to-be-printed relational graph exceeding the set print size, clustering nodes in the to-be-printed relational graph according to the print size and attribute information of the nodes to form a clustered overall view of the relational graph and subviews of the relational graph; and printing the clustered overall view of the relational graph after the clustering and subviews formed based on the clustered nodes. 2. The method according to claim 1, further comprising: in the overall view of the to-be-printed relational graph, scaling down regions corresponding to respective clusters of nodes obtained by the clustering to obtain the clustered overall view of the relational graph after the clustering; or in the overall view of the to-be-printed relational graph, displaying each cluster of nodes obtained by the clustering as a node to obtain the clustered overall view of the relational graph after the clustering. 3. The method according to claim 1, wherein printing the subviews formed by the clustered nodes comprises, for each cluster of nodes obtained by clustering: in response to a subview formed by the cluster of nodes is within the range of the print size, printing the subview formed by the cluster of nodes; and in response to the subview formed by the cluster of nodes exceeds the print size, re-clustering the cluster of nodes according to attribute information of the cluster of nodes to obtain clusters of next-level nodes, so that a subview formed by the cluster of nodes after the re-clustering is within the range of the print size; and printing the subview formed by the cluster of nodes after the re-clustering. 4. The method according to claim 3, further comprising: in the subview formed by the cluster of nodes, scaling down regions corresponding to clusters of next-level nodes obtained by the re-clustering to obtain a subview formed by the cluster of nodes after the re-clustering; or in the subview formed by the cluster of nodes, displaying each cluster of next-level nodes obtained by the re-clustering as a node to obtain a subview of the cluster of nodes after the re-clustering. 5. The method according to claim 3, further comprising: printing subviews formed by the cluster of next-level nodes after the re-clustering. 6. The method according to claim 5, further comprising: in response to the subview formed by the cluster of next-level nodes exceeds the print size, re-clustering the cluster of next-level nodes according to attribute information of the cluster of next-level nodes to obtain clusters of further next-level nodes, so that a re-clustered subview formed by the cluster of next-level nodes after the re-clustering is within the range of the print size. 7. The method according to claim 1, wherein the subviews formed by the clustered nodes comprise: subviews formed by clusters of nodes obtained by clustering, wherein a subview formed by a cluster of nodes is a maximal connected subgraph comprising this cluster of nodes. 8. An apparatus for printing a relational graph, comprising: a memory storing a set of instructions; and at least one processor configured to execute the set of instructions to cause the apparatus to perform: determining whether an overall view of a to-be-printed relational graph exceeds a set print size; in response to the overall view of the to-be-printed relational graph exceeding the set print size, clustering nodes in the to-be-printed relational graph according to the print size and attribute information of the nodes to form a clustered overall view of the relational graph and subviews of the relational graph; and printing the clustered overall view of the relational graph after the clustering and subviews formed based on the clustered nodes. 9. The apparatus according to claim 8, wherein the at least one processor is further configured to execute the set of instructions to cause the apparatus to perform: in the overall view of the to-be-printed relational graph, scaling down regions corresponding to respective clusters of nodes obtained by the clustering to obtain the clustered overall view of the relational graph after the clustering; or in the overall view of the to-be-printed relational graph, displaying each cluster of nodes obtained by the clustering as a node to obtain the clustered overall view of the relational graph after the clustering. 10. The apparatus according to claim 8, wherein the at least one processor is further configured to execute the set of instructions to cause the apparatus to perform: for each cluster of nodes obtained by clustering, in response to a subview formed by the cluster of nodes is within the range of the print size, printing the subview formed by the cluster of nodes; and in response to the subview formed by the cluster of nodes exceeds the print size, re-clustering the cluster of nodes according to attribute information of the cluster of nodes to obtain clusters of next-level nodes, so that a subview formed by the cluster of nodes after the re-clustering is within the range of the print size; and printing the subview formed by the cluster of nodes after the re-clustering. 11. The apparatus according to claim 10, wherein the at least one processor is further configured to execute the set of instructions to cause the apparatus to perform: in the subview formed by the cluster of nodes, scaling down regions corresponding to clusters of next-level nodes obtained by the re-clustering to obtain a subview formed by the cluster of nodes after the re-clustering; or in the subview formed by the cluster of nodes, displaying each cluster of next-level nodes obtained by the re-clustering as a node to obtain a subview of the cluster of nodes after the re-clustering. 12. The apparatus according to claim 10, wherein the at least one processor is further configured to execute the set of instructions to cause the apparatus to perform: printing subviews formed by the cluster of next-level nodes after the re-clustering. 13. The apparatus according to claim 8, wherein the subviews formed by the clustered nodes comprise: subviews formed by clusters of nodes obtained by clustering, wherein a subview formed by a cluster of nodes is a maximal connected subgraph comprising this cluster of nodes. 14. A non-transitory computer readable storage medium storing a set of instructions that are executable by one or more processing devices to cause a computer to perform a method for printing a relational graph, the method comprising: determining whether an overall view of a to-be-printed relational graph exceeds a set print size; in response to the overall view of a to-be-printed relational graph exceeding the set print size, clustering nodes in the to-be-printed relational graph according to the print size and attribute information of the nodes to form a clustered overall view of the relational graph and subviews of the relational graph; and printing the clustered overall view of the relational graph after the clustering and subviews formed based on the clustered nodes. 15. The non-transitory computer readable storage medium according to claim 14, wherein the method further comprises: in the overall view of the to-be-printed relational graph, scaling down regions corresponding to respective clusters of nodes obtained by the clustering to obtain the clustered overall view of the relational graph after the clustering; or in the overall view of the to-be-printed relational graph, displaying each cluster of nodes obtained by the clustering as a node to obtain the clustered overall view of the relational graph after the clustering. 16. The non-transitory computer readable storage medium according to claim 14, wherein printing the subviews formed by the clustered nodes comprises, for each cluster of nodes obtained by clustering: in response to a subview formed by the cluster of nodes is within the range of the print size, printing the subview formed by the cluster of nodes; and in response to the subview formed by the cluster of nodes exceeds the print size, re-clustering the cluster of nodes according to attribute information of the cluster of nodes to obtain clusters of next-level nodes, so that a subview formed by the cluster of nodes after the re-clustering is within the range of the print size; and printing the subview formed by the cluster of nodes after the re-clustering. 17. The non-transitory computer readable storage medium according to claim 16, wherein the method further comprises: in the subview formed by the cluster of nodes, scaling down regions corresponding to clusters of next-level nodes obtained by the re-clustering to obtain a subview formed by the cluster of nodes after the re-clustering; or in the subview formed by the cluster of nodes, displaying each cluster of next-level nodes obtained by the re-clustering as a node to obtain a subview of the cluster of nodes after the re-clustering. 18. The non-transitory computer readable storage medium according to claim 16, wherein the method further comprises: printing subviews formed by the cluster of next-level nodes after the re-clustering. 19. The non-transitory computer readable storage medium according to claim 18, wherein the method further comprises: in response to the subview formed by the cluster of next-level nodes exceeding the print size, re-clustering the cluster of next-level nodes according to attribute information of the cluster of next-level nodes to obtain clusters of further next-level nodes, so that a re-clustered subview formed by the cluster of next-level nodes after the re-clustering is within the range of the print size. 20. The non-transitory computer readable storage medium according to claim 14, wherein the subviews formed by the clustered nodes comprise: subviews formed by clusters of nodes obtained by clustering, wherein a subview formed by a cluster of nodes is a maximal connected subgraph comprising this cluster of nodes.
1,600
344,454
16,803,935
1,699
Scalable, robust cloud-based network management systems (NMSs) are described. In one, an NMS includes a set of NMS applications, a pool of device communication managers (DCMs), and a pool of device operations managers (DOMs). Each of the DCMs and DOMs executed by the processors as software containers. The NMS includes an API gateway configured to route remote procedure calls (RPCs) from the DCMs to the DOMs via the APIs exposed by the DOMs and according to device identifiers of the managed elements. The DOMs are configured to establish a set of persistent application-layer communication sessions from the DOMs to the DCMs and to direct communications from the NMS applications to the DCMs over the persistent application-layer communication sessions according to a mapping between device identifiers associated with the managed elements and network addresses associated with the DCMs.
1. A network management system comprising: one or more hardware-based processors; a set of one or more network management system (NMS) applications configured to execute on the processors; a pool of device communication managers (DCMs), each of the DCMs executed by the processors as a software container, and each of the DCMs configured to accept and manage a management session to one of a plurality of managed elements within a network; a pool of device operations managers (DOMs), each of the DOMs executed by the processors as a software container, and each of the DOMs configured to present an application programming interface (API) for performing operations on each of the managed elements according to device identifiers of the managed elements; and an API gateway configured to route remote procedure calls (RPCs) from the DCMs to the DOMs via APIs exposed by the DOMs and according to device identifiers of the managed elements as specified within the RPCs, wherein the DOMs are configured to establish a set of persistent application-layer communication sessions from the DOMs to the DCMs, and wherein the DOMs are configured to direct communications from the NMS applications to the DCMs over the persistent application-layer communication sessions according to a mapping between device identifiers associated with the managed elements and network addresses associated with the DCMs. 2. The network management system of claim 1, wherein the persistent application-layer communication sessions are Hyper Text Transfer Protocol version 2 (HTTP2) sessions originated from each of the DOMs and terminating on each of the DCMs. 3. The network management system of claim 1, wherein each DOM and each DCM is configured as a separate NMS microservice. 4. The network management system of claim 1, comprising a container service orchestrator configured to resolve a corresponding container name for each of the DOMs and each of the DCMs to a respective IP address. 5. The network management system of claim 1, wherein each of the DCMs is configured to embed a corresponding cookie within each of the RPCs issued to the DOMs, wherein each cookie specifies one of the device identifiers of the managed elements. 6. The network management system of claim 1, wherein the pool of DCMs and the pool of DOMs is dynamically scalable with respect to the number of software containers executing as DCMs and DOMs, wherein the DOMs are configured to maintain a table of orphan managed elements having device identifiers for which outbound communications from NMS applications have been received by the DOMs which, due to scaling, had not previously established the persistent application-layer communication sessions associated with the device identifiers. 7. The network management system of claim 6, wherein the DOMs are configured to scan the table of orphan managed elements and direct the DCMs associated with the device identifiers to reissue RPCs to the API gateway for routing to the DOMs. 8. A method executed by a network management system (NMS) comprising: receiving a request to establish a management session from a managed element with a first DCM of a pool of device communication managers (DCMs), each of the DCMs executed by one or more processors of the NMS as a software container, the managed element comprising one of a plurality of managed elements within a network; issuing, via an application programming interface (API) gateway, a remote procedure call (RPC) from the first DCM to a first device operations manger (DOM) of a pool of DOMs executed by the one or more processors of the NMS, each of the DOMs executed by the processors of the NMS as a software container, and each of the DOMs configured to present an API for performing operations on each of the managed elements according to device identifiers of the managed elements; establishing, with the first DOM, a persistent application-layer communication session from the first DOM to the first DCMs; and directing, with the first DOM, commands from a set of one or more NMS applications to the first DCMs over the persistent application-layer communication session according to a mapping between device identifiers associated with the managed elements and network addresses associated with the DCMs; and issuing the commands from the first DCM to the managed element via the management session. 9. The method of claim 8, further comprising routing, with the API gateway, remote procedure calls (RPCs) from the DCMs to the DOMs according to device identifiers of the managed elements as specified within the RPCs. 10. The method of claim 8, further comprising maintaining a table of orphan managed elements having device identifiers for which outbound communications from NMS applications have been received by at least one of the DOMs that, due to scaling of a total number of the DOMs in the pool of DOMs, has not previously established a persistent application-layer communication session associated with the device identifiers of the orphan managed elements. 11. The method of claim 10, further comprising scanning the table of orphan managed elements and directing the DCMs having managed sessions associated with the device identifiers listed in the table to reissue, to the API gateway, RPCs for routing to the DOMs so as to cause the DOMs to establish persistent application-layer communication sessions for the managed elements having the device identifiers listed in the table. 12. A computer-readable storage medium comprising instructions that, when executed, cause a processor of a network management system (NMS) to: receive a request to establish a management session from a managed element with a first one of a pool of device communication managers (DCMs), each of the DCMs executed by one or more processors of the NMS as a respective software container; issue, via an application programming interface (API) gateway, a remote procedure call from the first DCM to a first one of a pool of device operations managers (DOMs) executed by the one or more processors of the NMS, each of the DOMs executed by the one or more processors of the NMS as a respective software container, and each of the DOMs configured to present an API for performing operations on the managed elements according to device identifiers of the managed elements; establish, with the first DOM, a persistent application-layer communication session from the first DOM to the first DCM; direct, with the first DOM, commands from a set of one or more NMS applications to the first DCM over the persistent application-layer communication session according to a mapping between device identifiers associated with the managed elements and network addresses associated with the DCMs; and issue the commands from the first DCM to the managed element via the management session. 13. A network system comprising: a plurality of managed elements within a network; a network management system comprising: one or more hardware-based processors; a set of one or more network management system (NMS) applications configured to execute on the processors; a pool of device communication managers (DCMs), each of the DCMs executed by the processors as a software container, and each of the DCMs configured to accept and manage a management session for one of the plurality of managed elements; a pool of device operations managers (DOMs), each of the DOMs executed by the processors as a software container, and each of the DOMs configured to present an application programming interface (API) for performing operations on the plurality of managed elements according to device identifiers of the plurality of managed elements; an API gateway configured to route remote procedure calls (RPCs) from the DCMs to the DOMs via APIs exposed by the DOMs and according to device identifiers of the plurality of managed elements as specified within the RPCs, wherein the DOMs are configured to establish a set of persistent application-layer communication sessions from the DOMs to the DCMs, and wherein the DOMs are configured to direct communications from the NMS applications to the DCMs over the persistent application-layer communication sessions according to a mapping between device identifiers associated with the plurality of managed elements and network addresses associated with the DCMs; and a network address translation (NAT) device positioned between the NMS and the plurality of managed elements.
Scalable, robust cloud-based network management systems (NMSs) are described. In one, an NMS includes a set of NMS applications, a pool of device communication managers (DCMs), and a pool of device operations managers (DOMs). Each of the DCMs and DOMs executed by the processors as software containers. The NMS includes an API gateway configured to route remote procedure calls (RPCs) from the DCMs to the DOMs via the APIs exposed by the DOMs and according to device identifiers of the managed elements. The DOMs are configured to establish a set of persistent application-layer communication sessions from the DOMs to the DCMs and to direct communications from the NMS applications to the DCMs over the persistent application-layer communication sessions according to a mapping between device identifiers associated with the managed elements and network addresses associated with the DCMs.1. A network management system comprising: one or more hardware-based processors; a set of one or more network management system (NMS) applications configured to execute on the processors; a pool of device communication managers (DCMs), each of the DCMs executed by the processors as a software container, and each of the DCMs configured to accept and manage a management session to one of a plurality of managed elements within a network; a pool of device operations managers (DOMs), each of the DOMs executed by the processors as a software container, and each of the DOMs configured to present an application programming interface (API) for performing operations on each of the managed elements according to device identifiers of the managed elements; and an API gateway configured to route remote procedure calls (RPCs) from the DCMs to the DOMs via APIs exposed by the DOMs and according to device identifiers of the managed elements as specified within the RPCs, wherein the DOMs are configured to establish a set of persistent application-layer communication sessions from the DOMs to the DCMs, and wherein the DOMs are configured to direct communications from the NMS applications to the DCMs over the persistent application-layer communication sessions according to a mapping between device identifiers associated with the managed elements and network addresses associated with the DCMs. 2. The network management system of claim 1, wherein the persistent application-layer communication sessions are Hyper Text Transfer Protocol version 2 (HTTP2) sessions originated from each of the DOMs and terminating on each of the DCMs. 3. The network management system of claim 1, wherein each DOM and each DCM is configured as a separate NMS microservice. 4. The network management system of claim 1, comprising a container service orchestrator configured to resolve a corresponding container name for each of the DOMs and each of the DCMs to a respective IP address. 5. The network management system of claim 1, wherein each of the DCMs is configured to embed a corresponding cookie within each of the RPCs issued to the DOMs, wherein each cookie specifies one of the device identifiers of the managed elements. 6. The network management system of claim 1, wherein the pool of DCMs and the pool of DOMs is dynamically scalable with respect to the number of software containers executing as DCMs and DOMs, wherein the DOMs are configured to maintain a table of orphan managed elements having device identifiers for which outbound communications from NMS applications have been received by the DOMs which, due to scaling, had not previously established the persistent application-layer communication sessions associated with the device identifiers. 7. The network management system of claim 6, wherein the DOMs are configured to scan the table of orphan managed elements and direct the DCMs associated with the device identifiers to reissue RPCs to the API gateway for routing to the DOMs. 8. A method executed by a network management system (NMS) comprising: receiving a request to establish a management session from a managed element with a first DCM of a pool of device communication managers (DCMs), each of the DCMs executed by one or more processors of the NMS as a software container, the managed element comprising one of a plurality of managed elements within a network; issuing, via an application programming interface (API) gateway, a remote procedure call (RPC) from the first DCM to a first device operations manger (DOM) of a pool of DOMs executed by the one or more processors of the NMS, each of the DOMs executed by the processors of the NMS as a software container, and each of the DOMs configured to present an API for performing operations on each of the managed elements according to device identifiers of the managed elements; establishing, with the first DOM, a persistent application-layer communication session from the first DOM to the first DCMs; and directing, with the first DOM, commands from a set of one or more NMS applications to the first DCMs over the persistent application-layer communication session according to a mapping between device identifiers associated with the managed elements and network addresses associated with the DCMs; and issuing the commands from the first DCM to the managed element via the management session. 9. The method of claim 8, further comprising routing, with the API gateway, remote procedure calls (RPCs) from the DCMs to the DOMs according to device identifiers of the managed elements as specified within the RPCs. 10. The method of claim 8, further comprising maintaining a table of orphan managed elements having device identifiers for which outbound communications from NMS applications have been received by at least one of the DOMs that, due to scaling of a total number of the DOMs in the pool of DOMs, has not previously established a persistent application-layer communication session associated with the device identifiers of the orphan managed elements. 11. The method of claim 10, further comprising scanning the table of orphan managed elements and directing the DCMs having managed sessions associated with the device identifiers listed in the table to reissue, to the API gateway, RPCs for routing to the DOMs so as to cause the DOMs to establish persistent application-layer communication sessions for the managed elements having the device identifiers listed in the table. 12. A computer-readable storage medium comprising instructions that, when executed, cause a processor of a network management system (NMS) to: receive a request to establish a management session from a managed element with a first one of a pool of device communication managers (DCMs), each of the DCMs executed by one or more processors of the NMS as a respective software container; issue, via an application programming interface (API) gateway, a remote procedure call from the first DCM to a first one of a pool of device operations managers (DOMs) executed by the one or more processors of the NMS, each of the DOMs executed by the one or more processors of the NMS as a respective software container, and each of the DOMs configured to present an API for performing operations on the managed elements according to device identifiers of the managed elements; establish, with the first DOM, a persistent application-layer communication session from the first DOM to the first DCM; direct, with the first DOM, commands from a set of one or more NMS applications to the first DCM over the persistent application-layer communication session according to a mapping between device identifiers associated with the managed elements and network addresses associated with the DCMs; and issue the commands from the first DCM to the managed element via the management session. 13. A network system comprising: a plurality of managed elements within a network; a network management system comprising: one or more hardware-based processors; a set of one or more network management system (NMS) applications configured to execute on the processors; a pool of device communication managers (DCMs), each of the DCMs executed by the processors as a software container, and each of the DCMs configured to accept and manage a management session for one of the plurality of managed elements; a pool of device operations managers (DOMs), each of the DOMs executed by the processors as a software container, and each of the DOMs configured to present an application programming interface (API) for performing operations on the plurality of managed elements according to device identifiers of the plurality of managed elements; an API gateway configured to route remote procedure calls (RPCs) from the DCMs to the DOMs via APIs exposed by the DOMs and according to device identifiers of the plurality of managed elements as specified within the RPCs, wherein the DOMs are configured to establish a set of persistent application-layer communication sessions from the DOMs to the DCMs, and wherein the DOMs are configured to direct communications from the NMS applications to the DCMs over the persistent application-layer communication sessions according to a mapping between device identifiers associated with the plurality of managed elements and network addresses associated with the DCMs; and a network address translation (NAT) device positioned between the NMS and the plurality of managed elements.
1,600
344,455
16,803,963
1,699
Deposition methods and apparatus for conditioning a process kit to increase process kit lifetime are described. A nitride film formed on a process kit is exposed to conditioning process comprising nitrogen and hydrogen radicals to condition the nitride film to decrease particulate contamination from the process kit.
1. A deposition method comprising: exposing a process kit of a process chamber having a nitride film thereon to a conditioning process comprising nitrogen and hydrogen radicals to form a conditioned nitride film; and depositing a nitride layer on a plurality of wafers within the process chamber. 2. The method of claim 1, wherein the conditioning process increases a density of the nitride film on the process kit. 3. The method of claim 2, wherein the conditioned nitride film comprises tantalum nitride (TaN) with a density in the range of 9.5 g/cm3 to 10 g/cm3. 4. The method of claim 2, wherein the conditioned nitride film has a compressive stress. 5. The method of claim 1, wherein the nitride layer on the plurality of wafers is deposited by atomic layer deposition. 6. The method of claim 5, wherein the nitride film on the process kit is formed during deposition of the nitride layer on a wafer. 7. The method of claim 1, wherein the nitride film comprises one or more of tantalum nitride (TaN), titanium nitride (TiN), ruthenium tantalum nitride (RuTaN), manganese nitride (MnN), tungsten nitride (WN) or niobium nitride (NbN). 8. The method of claim 1, wherein the conditioning process comprises a plasma formed from a conditioning gas, the conditioning gas comprising at least one plasma species having nitrogen and hydrogen atoms. 9. The method of claim 8, wherein the conditioning gas comprises one or more of ammonia (NH3), hydrazine (N2H4), nitrogen (N2), hydrogen (H2) or argon (Ar). 10. The method of claim 9, wherein the conditioning gas consists essentially of ammonia, hydrogen and argon. 11. The method of claim 10, wherein the ammonia, hydrogen and argon (NH3:H2:Ar) ratio is in the range of 0.9-1.1:0.9-1.1:0.9-1.1. 12. The method of claim 8, wherein the plasma has a frequency in the range of 13.56 to 40 MHz. 13. The method of claim 8, wherein the plasma has a pressure in the range of 1.5 to 10 torr. 14. The method of claim 8, wherein the conditioning process is performed for less than or equal to five minutes. 15. The method of claim 1, wherein the plurality of wafers is in the range of 5 to 50 before an additional exposure to the conditioning process. 16. The method of claim 1, wherein a lifetime of the process kit is increased by at least 5× relative to a process without the conditioning process. 17. The method of claim 1, wherein the process kit comprises one or more of a showerhead, pumping liner or edge ring. 18. A deposition method comprising: processing a plurality of wafers within a process chamber to deposit tantalum nitride (TaN) on the wafers and a nitride film on a process kit within the process chamber, the nitride film having a density less than 9 g/cm3; and conditioning the process kit after processing the plurality of wafers using a conditioning process, the conditioning process comprising exposing the process kit to nitrogen and hydrogen radicals to increase the density of the nitride film to greater than 9 g/cm3 and generate a nitride film with compressive stress. 19. The method of claim 18, wherein the plurality of wafers is in the range of 5 to 50. 20. A non-transitory computer readable medium including instructions, that, when executed by a controller of a processing chamber, causes the processing chamber to perform operations of: exposing a substrate to a deposition process condition to deposit a nitride film; and exposing a process kit of the process chamber to a conditioning process.
Deposition methods and apparatus for conditioning a process kit to increase process kit lifetime are described. A nitride film formed on a process kit is exposed to conditioning process comprising nitrogen and hydrogen radicals to condition the nitride film to decrease particulate contamination from the process kit.1. A deposition method comprising: exposing a process kit of a process chamber having a nitride film thereon to a conditioning process comprising nitrogen and hydrogen radicals to form a conditioned nitride film; and depositing a nitride layer on a plurality of wafers within the process chamber. 2. The method of claim 1, wherein the conditioning process increases a density of the nitride film on the process kit. 3. The method of claim 2, wherein the conditioned nitride film comprises tantalum nitride (TaN) with a density in the range of 9.5 g/cm3 to 10 g/cm3. 4. The method of claim 2, wherein the conditioned nitride film has a compressive stress. 5. The method of claim 1, wherein the nitride layer on the plurality of wafers is deposited by atomic layer deposition. 6. The method of claim 5, wherein the nitride film on the process kit is formed during deposition of the nitride layer on a wafer. 7. The method of claim 1, wherein the nitride film comprises one or more of tantalum nitride (TaN), titanium nitride (TiN), ruthenium tantalum nitride (RuTaN), manganese nitride (MnN), tungsten nitride (WN) or niobium nitride (NbN). 8. The method of claim 1, wherein the conditioning process comprises a plasma formed from a conditioning gas, the conditioning gas comprising at least one plasma species having nitrogen and hydrogen atoms. 9. The method of claim 8, wherein the conditioning gas comprises one or more of ammonia (NH3), hydrazine (N2H4), nitrogen (N2), hydrogen (H2) or argon (Ar). 10. The method of claim 9, wherein the conditioning gas consists essentially of ammonia, hydrogen and argon. 11. The method of claim 10, wherein the ammonia, hydrogen and argon (NH3:H2:Ar) ratio is in the range of 0.9-1.1:0.9-1.1:0.9-1.1. 12. The method of claim 8, wherein the plasma has a frequency in the range of 13.56 to 40 MHz. 13. The method of claim 8, wherein the plasma has a pressure in the range of 1.5 to 10 torr. 14. The method of claim 8, wherein the conditioning process is performed for less than or equal to five minutes. 15. The method of claim 1, wherein the plurality of wafers is in the range of 5 to 50 before an additional exposure to the conditioning process. 16. The method of claim 1, wherein a lifetime of the process kit is increased by at least 5× relative to a process without the conditioning process. 17. The method of claim 1, wherein the process kit comprises one or more of a showerhead, pumping liner or edge ring. 18. A deposition method comprising: processing a plurality of wafers within a process chamber to deposit tantalum nitride (TaN) on the wafers and a nitride film on a process kit within the process chamber, the nitride film having a density less than 9 g/cm3; and conditioning the process kit after processing the plurality of wafers using a conditioning process, the conditioning process comprising exposing the process kit to nitrogen and hydrogen radicals to increase the density of the nitride film to greater than 9 g/cm3 and generate a nitride film with compressive stress. 19. The method of claim 18, wherein the plurality of wafers is in the range of 5 to 50. 20. A non-transitory computer readable medium including instructions, that, when executed by a controller of a processing chamber, causes the processing chamber to perform operations of: exposing a substrate to a deposition process condition to deposit a nitride film; and exposing a process kit of the process chamber to a conditioning process.
1,600
344,456
16,803,938
2,886
Light detectors that combine field emission with light focusing by surface plasmon polaritons. Methods and devices that allow detection and measurement of light at high frequencies in the THz range are described. The disclosed devices include plasmonic metal contacts with a narrow nanometer-sized gap to couple an optical waveguide mode into a plasmonic mode thereby generating filed emission currents by biasing the contacts.
1. A method of detecting and measuring light comprising: providing first and second plasmonic metal contacts separated by a gap in a range of 10 to 50 nm to form a plasmon waveguide; coupling the first and the second plasmonic metal contacts with an on-chip optical waveguide having a first refractive index, the optical waveguide being separated vertically from the plasmon waveguide by a dielectric layer having a second refractive index, the second refractive index being greater than one and less than the first refractive index; coupling light into the optical waveguide to generate an optical mode; applying a biasing voltage to the first and the second plasmonic metal contacts; and configuring the plasmon waveguide such that the optical mode is coupled into a plasmon mode within the gap, thereby generating a field emission current as a function of an intensity of the light, the field emission current flowing through the gap from the first to the second plasmonic metal contact. 2. The method of claim 1, wherein the first and second plasmonic metal contacts are selected from the group consisting of gold, silver, copper, aluminum, or a combination thereof. 3. The method of claim 1, wherein the dielectric layer has a width in a range of 15 nm to 25 nm. 4. The method of claim 3, wherein the dielectric layer comprises silicon dioxide and the optical waveguide is made of silicon. 5. The method of claim 1, wherein the light is coupled into the optical waveguide from an optical fiber. 6. The method of claim 3, wherein the dielectric layer has a width of 20 nm. 7. A photodetector comprising: an optical waveguide connected with a plasmonic waveguide, the plasmonic waveguide comprising first and a second plasmonic metal contacts separated by a gap of 10 nm to 50 nm, wherein: the optical waveguide is configured to receive light to generate an optical mode; and the plasmonic waveguide is configured to allow coupling of the optical mode into a plasmonic mode within the gap. 8. The photodetector of claim 7, wherein the first and the second plasmonic metal contacts are configured to receive a bias voltage to generate a field emission current flowing through the gap from the first plasmon metal contact to the second plasmon metal contact. 9. The photodetector of claim 8, wherein the first and/or the second plasmonic metal contacts are selected from the group consisting of gold, silver, copper, aluminum, or a combination thereof. 10. The photodetector of claim 7, wherein the optical waveguide is coupled with a dielectric layer having a thickness in a 15 nm to 25 nm range, with a first and a second side. 11. The photodetector of claim 10, wherein the optical waveguide is configured to receive the light and to couple the light to plasmonic waveguide. 12. The photodetector of claim 11, wherein the dielectric layer comprises silicon dioxide and the optical waveguide comprises silicon. 13. The photodetector of claim 12, wherein the dielectric layer is connected with the first and the second plasmonic metal contacts on the first side, and with the optical waveguide at the second side. 14. The photodetector of claim 7, wherein the optical waveguide receives the light from an optical fiber. 15. The photodetector of claim 10, wherein the low index dielectric layer has a thickness of 20 nm. 16. The photodetector of claim 8, further comprising a gate metal contact connected with the optical waveguide, the gate metal contact being configured to receive a voltage to bias the optical waveguide, thereby controlling the field emission current.
Light detectors that combine field emission with light focusing by surface plasmon polaritons. Methods and devices that allow detection and measurement of light at high frequencies in the THz range are described. The disclosed devices include plasmonic metal contacts with a narrow nanometer-sized gap to couple an optical waveguide mode into a plasmonic mode thereby generating filed emission currents by biasing the contacts.1. A method of detecting and measuring light comprising: providing first and second plasmonic metal contacts separated by a gap in a range of 10 to 50 nm to form a plasmon waveguide; coupling the first and the second plasmonic metal contacts with an on-chip optical waveguide having a first refractive index, the optical waveguide being separated vertically from the plasmon waveguide by a dielectric layer having a second refractive index, the second refractive index being greater than one and less than the first refractive index; coupling light into the optical waveguide to generate an optical mode; applying a biasing voltage to the first and the second plasmonic metal contacts; and configuring the plasmon waveguide such that the optical mode is coupled into a plasmon mode within the gap, thereby generating a field emission current as a function of an intensity of the light, the field emission current flowing through the gap from the first to the second plasmonic metal contact. 2. The method of claim 1, wherein the first and second plasmonic metal contacts are selected from the group consisting of gold, silver, copper, aluminum, or a combination thereof. 3. The method of claim 1, wherein the dielectric layer has a width in a range of 15 nm to 25 nm. 4. The method of claim 3, wherein the dielectric layer comprises silicon dioxide and the optical waveguide is made of silicon. 5. The method of claim 1, wherein the light is coupled into the optical waveguide from an optical fiber. 6. The method of claim 3, wherein the dielectric layer has a width of 20 nm. 7. A photodetector comprising: an optical waveguide connected with a plasmonic waveguide, the plasmonic waveguide comprising first and a second plasmonic metal contacts separated by a gap of 10 nm to 50 nm, wherein: the optical waveguide is configured to receive light to generate an optical mode; and the plasmonic waveguide is configured to allow coupling of the optical mode into a plasmonic mode within the gap. 8. The photodetector of claim 7, wherein the first and the second plasmonic metal contacts are configured to receive a bias voltage to generate a field emission current flowing through the gap from the first plasmon metal contact to the second plasmon metal contact. 9. The photodetector of claim 8, wherein the first and/or the second plasmonic metal contacts are selected from the group consisting of gold, silver, copper, aluminum, or a combination thereof. 10. The photodetector of claim 7, wherein the optical waveguide is coupled with a dielectric layer having a thickness in a 15 nm to 25 nm range, with a first and a second side. 11. The photodetector of claim 10, wherein the optical waveguide is configured to receive the light and to couple the light to plasmonic waveguide. 12. The photodetector of claim 11, wherein the dielectric layer comprises silicon dioxide and the optical waveguide comprises silicon. 13. The photodetector of claim 12, wherein the dielectric layer is connected with the first and the second plasmonic metal contacts on the first side, and with the optical waveguide at the second side. 14. The photodetector of claim 7, wherein the optical waveguide receives the light from an optical fiber. 15. The photodetector of claim 10, wherein the low index dielectric layer has a thickness of 20 nm. 16. The photodetector of claim 8, further comprising a gate metal contact connected with the optical waveguide, the gate metal contact being configured to receive a voltage to bias the optical waveguide, thereby controlling the field emission current.
2,800
344,457
16,803,905
2,886
Improved support structures and systems are disclosed for installing tablet devices, display screens, flat screen monitors, or medical devices within a wide variety of environments. A core arm extends from a rear end, toward a front end, in which the rear end is configured to be pivotably mounted either directly to a mount structure, or to an extension arm that in turn is mounted to a mount structure. The front end is configured to be pivotably mounted to a front-end panel mount structure. The structures and systems can be configured for light or heavy configurations, with or without the use of an extension arm, and can provide fully concealed cable routing, in which one or more cables are readily accessible, via snap fit covers, for easy installation and maintenance, which can provide a clean structure that can readily be serviced and cleaned as desired.
1. A support arm comprising: a core arm body extending from a first end to a second end opposing the first end, wherein the first end is pivotably mounted to a mount structure, and wherein the second end is pivotably mounted to a front-end panel mount structure; a rear axle disposed on the first end; a front axle disposed on the second end; a friction pack element disposed within the second end of the core arm body, the friction pack element providing both a level of upward resistance and a level of downward resistance; and a linkage assembly that comprises a spring element extending from the first end to the second end, the spring element providing a gas spring counterbalance force. 2. The support arm of claim 1, wherein the front-end panel mount structure is configured to engage with a display device, and wherein the front-end panel mount structure is configured to rotate about a vertical axis. 3. The support arm of claim 1, wherein the gas spring counterbalance force is non-adjustable, and wherein the gas spring counterbalance is configured to be set for any counterbalance value that is within a payload range. 4. The support arm of claim 1, wherein the friction pack element is non-adjustable, and wherein the friction pack element supports any payload that is within a range of payloads. 5. The support arm of claim 1, wherein the extension arm mounts to the mount structure at the first end and extends to a rear mount configured to engage to an environmental support structure. 6. The support arm of claim 5, wherein the extension arm is disposed subjacent to the core arm body, wherein the mount structure facilitates rotation of the core arm body about a vertical axis, and wherein the rear mount facilitates rotation of the extension arm about the vertical axis. 7. The support arm of claim 1, wherein the core arm body forms an opening interior of the core arm body, the opening configured to receive cabling for a display device, wherein the cabling is configured to exposed at the front-end panel mount structure. 8. The support arm of claim 7, wherein a rotation range of the front-end panel mount structure relative to a vertical axis prevents binding of the cabling for the display device disposed in the core arm body through the front-end panel mount structure. 9. The support arm of claim 1, wherein the mount structure engaged to the first end includes a joint rotation stop structure configured to limit rotation of the mount structure to a defined rotation range relative to a vertical axis. 10. The support arm of claim 9, wherein the joint rotation stop structure includes: a pivot stop floating key configured to facilitate rotating of the joint rotation stop structure about a pivot stop rotation range relative to the vertical axis; a pivot stop disc disposed interior of the pivot stop floating key, wherein the pivot stop disc includes a protruded surface that, when engaged with the pivot stop floating key at a position at an end of the pivot stop rotation range, prevents rotation of the pivot stop floating key; and a pivot post disposed interior to the pivot stop disc and engaged to both the pivot stop floating key and the pivot stop disc. 11. An apparatus to provide support and rotational movement to a display device, the apparatus comprising: a support arm extending from a rear end to a front end opposing the rear end, the support arm including: a mount structure disposed at the rear end; a front-end panel mount structure disposed at the front end configured to engage with the display device and rotate about a vertical axis; a rear axle disposed on the rear end; a front axle disposed on the front end; and a linkage assembly that includes a spring element extending from the rear end to the front end; and an extension arm engaged to the support arm at the mount structure, the extension arm including a rear mount configured to engage to an environmental support structure and rotate the extension arm about the vertical axis. 12. The apparatus of claim 11, wherein the spring element provides a gas spring counterbalance force that is non-adjustable and configured to be set for any counterbalance value that is within a payload range. 13. The apparatus of claim 11, further comprising: a friction pack element disposed within the front end of the core arm, wherein the friction pack element provides both a level of upward resistance and a level of downward resistance. 14. The apparatus of claim 11, wherein the core arm forms an opening interior of the core arm, the opening configured to receive cabling for a display device, wherein the cabling is configured to exposed at the front-end panel mount structure. 15. The apparatus of claim 11, wherein the mount structure engaged to the first end includes a joint rotation stop structure configured to limit rotation of the mount structure to a defined rotation range relative to the vertical axis 16. The apparatus of claim 15, wherein the joint rotation stop structure includes: a pivot stop floating key configured to facilitate rotating of the joint rotation stop structure about a pivot stop rotation range relative to the vertical axis; a pivot stop disc disposed interior of the pivot stop floating key, wherein the pivot stop disc includes a protruded surface that, when engaged with the pivot stop floating key at a position at an end of the pivot stop rotation range, prevents rotation of the pivot stop floating key; and a pivot post disposed interior to the pivot stop disc and engaged to both the pivot stop floating key and the pivot stop disc. 17. The apparatus of claim 11, wherein the extension arm is disposed subjacent to the core arm body, wherein the mount structure facilitates rotation of the core arm body about a vertical axis, and wherein the rear mount facilitates rotation of the extension arm about the vertical axis. 18. A method for engaging a support arm to both a display device and an environmental support structure, the method comprising: engaging an extension arm to the environment support structure via a mount structure, the rear mount configured to rotate the extension arm about a vertical axis; and engaging a core arm to the display device via a front-end panel mount structure disposed at a front end of the core arm and configured to rotate the display device about the vertical axis, the core arm engaged to the extension arm via a mount structure, and wherein the core arm is configured to rotate about the vertical axis via a rear axle disposed on a rear end, a front axle disposed on the front end, and a linkage assembly that includes a spring element extending from the rear end to the front end. 19. The method of claim 18, wherein the mount structure engaged to the first end includes a joint rotation stop structure that limits rotation of the mount structure to a defined rotation range relative to the vertical axis, wherein the joint rotation stop structure includes: a pivot stop floating key configured to facilitate rotating of the joint rotation stop structure about a pivot stop rotation range relative to the vertical axis; a pivot stop disc disposed interior of the pivot stop floating key, wherein the pivot stop disc includes a protruded surface that, when engaged with the pivot stop floating key at a position at an end of the pivot stop rotation range, prevents rotation of the pivot stop floating key; and a pivot post disposed interior to the pivot stop disc and engaged to both the pivot stop floating key and the pivot stop disc. 20. The method of claim 19, further comprising: disposing at least one cable through an opening formed within the core arm body and the extension arm via the mount structure, wherein rotation of the mount structure is limited to the defined rotation range relative to the vertical axis so as to prevent binding of the at least cable.
Improved support structures and systems are disclosed for installing tablet devices, display screens, flat screen monitors, or medical devices within a wide variety of environments. A core arm extends from a rear end, toward a front end, in which the rear end is configured to be pivotably mounted either directly to a mount structure, or to an extension arm that in turn is mounted to a mount structure. The front end is configured to be pivotably mounted to a front-end panel mount structure. The structures and systems can be configured for light or heavy configurations, with or without the use of an extension arm, and can provide fully concealed cable routing, in which one or more cables are readily accessible, via snap fit covers, for easy installation and maintenance, which can provide a clean structure that can readily be serviced and cleaned as desired.1. A support arm comprising: a core arm body extending from a first end to a second end opposing the first end, wherein the first end is pivotably mounted to a mount structure, and wherein the second end is pivotably mounted to a front-end panel mount structure; a rear axle disposed on the first end; a front axle disposed on the second end; a friction pack element disposed within the second end of the core arm body, the friction pack element providing both a level of upward resistance and a level of downward resistance; and a linkage assembly that comprises a spring element extending from the first end to the second end, the spring element providing a gas spring counterbalance force. 2. The support arm of claim 1, wherein the front-end panel mount structure is configured to engage with a display device, and wherein the front-end panel mount structure is configured to rotate about a vertical axis. 3. The support arm of claim 1, wherein the gas spring counterbalance force is non-adjustable, and wherein the gas spring counterbalance is configured to be set for any counterbalance value that is within a payload range. 4. The support arm of claim 1, wherein the friction pack element is non-adjustable, and wherein the friction pack element supports any payload that is within a range of payloads. 5. The support arm of claim 1, wherein the extension arm mounts to the mount structure at the first end and extends to a rear mount configured to engage to an environmental support structure. 6. The support arm of claim 5, wherein the extension arm is disposed subjacent to the core arm body, wherein the mount structure facilitates rotation of the core arm body about a vertical axis, and wherein the rear mount facilitates rotation of the extension arm about the vertical axis. 7. The support arm of claim 1, wherein the core arm body forms an opening interior of the core arm body, the opening configured to receive cabling for a display device, wherein the cabling is configured to exposed at the front-end panel mount structure. 8. The support arm of claim 7, wherein a rotation range of the front-end panel mount structure relative to a vertical axis prevents binding of the cabling for the display device disposed in the core arm body through the front-end panel mount structure. 9. The support arm of claim 1, wherein the mount structure engaged to the first end includes a joint rotation stop structure configured to limit rotation of the mount structure to a defined rotation range relative to a vertical axis. 10. The support arm of claim 9, wherein the joint rotation stop structure includes: a pivot stop floating key configured to facilitate rotating of the joint rotation stop structure about a pivot stop rotation range relative to the vertical axis; a pivot stop disc disposed interior of the pivot stop floating key, wherein the pivot stop disc includes a protruded surface that, when engaged with the pivot stop floating key at a position at an end of the pivot stop rotation range, prevents rotation of the pivot stop floating key; and a pivot post disposed interior to the pivot stop disc and engaged to both the pivot stop floating key and the pivot stop disc. 11. An apparatus to provide support and rotational movement to a display device, the apparatus comprising: a support arm extending from a rear end to a front end opposing the rear end, the support arm including: a mount structure disposed at the rear end; a front-end panel mount structure disposed at the front end configured to engage with the display device and rotate about a vertical axis; a rear axle disposed on the rear end; a front axle disposed on the front end; and a linkage assembly that includes a spring element extending from the rear end to the front end; and an extension arm engaged to the support arm at the mount structure, the extension arm including a rear mount configured to engage to an environmental support structure and rotate the extension arm about the vertical axis. 12. The apparatus of claim 11, wherein the spring element provides a gas spring counterbalance force that is non-adjustable and configured to be set for any counterbalance value that is within a payload range. 13. The apparatus of claim 11, further comprising: a friction pack element disposed within the front end of the core arm, wherein the friction pack element provides both a level of upward resistance and a level of downward resistance. 14. The apparatus of claim 11, wherein the core arm forms an opening interior of the core arm, the opening configured to receive cabling for a display device, wherein the cabling is configured to exposed at the front-end panel mount structure. 15. The apparatus of claim 11, wherein the mount structure engaged to the first end includes a joint rotation stop structure configured to limit rotation of the mount structure to a defined rotation range relative to the vertical axis 16. The apparatus of claim 15, wherein the joint rotation stop structure includes: a pivot stop floating key configured to facilitate rotating of the joint rotation stop structure about a pivot stop rotation range relative to the vertical axis; a pivot stop disc disposed interior of the pivot stop floating key, wherein the pivot stop disc includes a protruded surface that, when engaged with the pivot stop floating key at a position at an end of the pivot stop rotation range, prevents rotation of the pivot stop floating key; and a pivot post disposed interior to the pivot stop disc and engaged to both the pivot stop floating key and the pivot stop disc. 17. The apparatus of claim 11, wherein the extension arm is disposed subjacent to the core arm body, wherein the mount structure facilitates rotation of the core arm body about a vertical axis, and wherein the rear mount facilitates rotation of the extension arm about the vertical axis. 18. A method for engaging a support arm to both a display device and an environmental support structure, the method comprising: engaging an extension arm to the environment support structure via a mount structure, the rear mount configured to rotate the extension arm about a vertical axis; and engaging a core arm to the display device via a front-end panel mount structure disposed at a front end of the core arm and configured to rotate the display device about the vertical axis, the core arm engaged to the extension arm via a mount structure, and wherein the core arm is configured to rotate about the vertical axis via a rear axle disposed on a rear end, a front axle disposed on the front end, and a linkage assembly that includes a spring element extending from the rear end to the front end. 19. The method of claim 18, wherein the mount structure engaged to the first end includes a joint rotation stop structure that limits rotation of the mount structure to a defined rotation range relative to the vertical axis, wherein the joint rotation stop structure includes: a pivot stop floating key configured to facilitate rotating of the joint rotation stop structure about a pivot stop rotation range relative to the vertical axis; a pivot stop disc disposed interior of the pivot stop floating key, wherein the pivot stop disc includes a protruded surface that, when engaged with the pivot stop floating key at a position at an end of the pivot stop rotation range, prevents rotation of the pivot stop floating key; and a pivot post disposed interior to the pivot stop disc and engaged to both the pivot stop floating key and the pivot stop disc. 20. The method of claim 19, further comprising: disposing at least one cable through an opening formed within the core arm body and the extension arm via the mount structure, wherein rotation of the mount structure is limited to the defined rotation range relative to the vertical axis so as to prevent binding of the at least cable.
2,800
344,458
16,803,941
2,886
An artificial intelligence device includes a memory and a processor. The memory is configured to store audio data having a predetermined speech style. The processor is configured to generate a condition vector relating to a condition for determining the speech style of the audio data, reduce a dimension of the condition vector to a predetermined reduction dimension, acquire a sparse code vector based on a dictionary vector acquired through sparse dictionary coding with respect to the condition vector having the predetermined reduction dimension, and change a vector element value included in the sparse code vector.
1. A method for controlling a speech style, the method comprising: acquiring audio data having a predetermined speech style; generating a condition vector relating to a condition for determining the speech style of the audio data; reducing a dimension of the condition vector to a predetermined reduction dimension; acquiring a sparse code vector based on a dictionary vector acquired through sparse dictionary coding with respect to the condition vector having the predetermined reduction dimension; and changing a vector element value included in the sparse code vector. 2. The method according to claim 1, wherein the reducing to the predetermined reduction dimension comprises reducing the condition vector to the predetermined reduction dimension by applying a Principal Component Analysis (PCA) algorithm to the condition vector. 3. The method according to claim 1, further comprising: acquiring a plurality of pieces of audio training data for the sparse dictionary coding; acquiring condition training vectors relating to the condition for determining the speech style with respect to the plurality of pieces of audio training data; reducing the dimension of each of the condition training vectors to the predetermined reduction dimension; and acquiring a dictionary vector and a sparse representation coefficient vector, which are capable of acquiring the condition training vector, through sparse coding. 4. The method according to claim 1, wherein the changing of the vector element value comprises changing a vector element value for a valid vector element included in the sparse code vector. 5. The method according to claim 1, wherein, when the sparse code vector is plural, the changing of the vector element value comprises changing a vector element value based on a valid vector element included in each of the plurality of sparse code vectors. 6. The method according to claim 1, further comprising: acquiring the condition vector having the predetermined reduction dimension from the sparse code vector having the changed vector element value based on the dictionary vector; and acquiring the condition vector in which the condition for determining the speech style is changed by extending the dimension of the condition vector having the predetermined dimension. 7. The method according to claim 6, further comprising: acquiring a prosody vector representing each of at least one speech style; and generating a prosody embedding vector having a changed speech style using the prosody vector and the condition vector having the changed condition for determining the speech style. 8. The method according to claim 7, further comprising: acquiring text data; and generating a synthesized speech based on the text data and the prosody embedding vector. 9. An artificial intelligence device comprising: a memory configured to store audio data having a predetermined speech style; and a processor configured to: generate a condition vector relating to a condition for determining the speech style of the audio data; reduce a dimension of the condition vector to a predetermined reduction dimension; acquire a sparse code vector based on a dictionary vector acquired through sparse dictionary coding with respect to the condition vector having the predetermined reduction dimension; and change a vector element value included in the sparse code vector. 10. The artificial intelligence device according to claim 9, wherein the processor is configured to reduce the condition vector to the predetermined reduction dimension by applying a Principal Component Analysis (PCA) algorithm to the condition vector. 11. The artificial intelligence device according to claim 9, wherein the processor is configured to: acquire a plurality of pieces of audio training data for the sparse dictionary coding; acquire condition training vectors for determining the speech style with respect to the plurality of pieces of audio training data; reduce the dimension of each of the condition training vectors to the predetermined reduction dimension; and acquire a dictionary vector and a sparse representation coefficient vector, which are capable of acquiring the condition training vector, through sparse coding. 12. The artificial intelligence device according to claim 9, wherein the processor is configured to change a vector element value for a valid vector element included in the sparse code vector. 13. The artificial intelligence device according to claim 9, wherein, when the sparse code vector is plural, the processor is configured to change a vector element value based on a valid vector element included in each of the plurality of sparse code vectors. 14. The artificial intelligence device according to claim 9, wherein the processor is configured to: acquire the condition vector having the predetermined reduction dimension from the sparse code vector having the changed vector element value based on the dictionary vector; and acquire the condition vector in which the condition for determining the speech style is changed by extending the dimension of the condition vector having the predetermined dimension. 15. The artificial intelligence device according to claim 14, wherein the processor is configured to: acquire a prosody vector representing each of at least one speech style; and generate a prosody embedding vector having a changed speech style using the prosody vector and the condition vector having the changed condition for determining the speech style. 16. The artificial intelligence device according to claim 15, wherein the processor is configured to: acquire text data; and generate a synthesized speech based on the text data and the prosody embedding vector.
An artificial intelligence device includes a memory and a processor. The memory is configured to store audio data having a predetermined speech style. The processor is configured to generate a condition vector relating to a condition for determining the speech style of the audio data, reduce a dimension of the condition vector to a predetermined reduction dimension, acquire a sparse code vector based on a dictionary vector acquired through sparse dictionary coding with respect to the condition vector having the predetermined reduction dimension, and change a vector element value included in the sparse code vector.1. A method for controlling a speech style, the method comprising: acquiring audio data having a predetermined speech style; generating a condition vector relating to a condition for determining the speech style of the audio data; reducing a dimension of the condition vector to a predetermined reduction dimension; acquiring a sparse code vector based on a dictionary vector acquired through sparse dictionary coding with respect to the condition vector having the predetermined reduction dimension; and changing a vector element value included in the sparse code vector. 2. The method according to claim 1, wherein the reducing to the predetermined reduction dimension comprises reducing the condition vector to the predetermined reduction dimension by applying a Principal Component Analysis (PCA) algorithm to the condition vector. 3. The method according to claim 1, further comprising: acquiring a plurality of pieces of audio training data for the sparse dictionary coding; acquiring condition training vectors relating to the condition for determining the speech style with respect to the plurality of pieces of audio training data; reducing the dimension of each of the condition training vectors to the predetermined reduction dimension; and acquiring a dictionary vector and a sparse representation coefficient vector, which are capable of acquiring the condition training vector, through sparse coding. 4. The method according to claim 1, wherein the changing of the vector element value comprises changing a vector element value for a valid vector element included in the sparse code vector. 5. The method according to claim 1, wherein, when the sparse code vector is plural, the changing of the vector element value comprises changing a vector element value based on a valid vector element included in each of the plurality of sparse code vectors. 6. The method according to claim 1, further comprising: acquiring the condition vector having the predetermined reduction dimension from the sparse code vector having the changed vector element value based on the dictionary vector; and acquiring the condition vector in which the condition for determining the speech style is changed by extending the dimension of the condition vector having the predetermined dimension. 7. The method according to claim 6, further comprising: acquiring a prosody vector representing each of at least one speech style; and generating a prosody embedding vector having a changed speech style using the prosody vector and the condition vector having the changed condition for determining the speech style. 8. The method according to claim 7, further comprising: acquiring text data; and generating a synthesized speech based on the text data and the prosody embedding vector. 9. An artificial intelligence device comprising: a memory configured to store audio data having a predetermined speech style; and a processor configured to: generate a condition vector relating to a condition for determining the speech style of the audio data; reduce a dimension of the condition vector to a predetermined reduction dimension; acquire a sparse code vector based on a dictionary vector acquired through sparse dictionary coding with respect to the condition vector having the predetermined reduction dimension; and change a vector element value included in the sparse code vector. 10. The artificial intelligence device according to claim 9, wherein the processor is configured to reduce the condition vector to the predetermined reduction dimension by applying a Principal Component Analysis (PCA) algorithm to the condition vector. 11. The artificial intelligence device according to claim 9, wherein the processor is configured to: acquire a plurality of pieces of audio training data for the sparse dictionary coding; acquire condition training vectors for determining the speech style with respect to the plurality of pieces of audio training data; reduce the dimension of each of the condition training vectors to the predetermined reduction dimension; and acquire a dictionary vector and a sparse representation coefficient vector, which are capable of acquiring the condition training vector, through sparse coding. 12. The artificial intelligence device according to claim 9, wherein the processor is configured to change a vector element value for a valid vector element included in the sparse code vector. 13. The artificial intelligence device according to claim 9, wherein, when the sparse code vector is plural, the processor is configured to change a vector element value based on a valid vector element included in each of the plurality of sparse code vectors. 14. The artificial intelligence device according to claim 9, wherein the processor is configured to: acquire the condition vector having the predetermined reduction dimension from the sparse code vector having the changed vector element value based on the dictionary vector; and acquire the condition vector in which the condition for determining the speech style is changed by extending the dimension of the condition vector having the predetermined dimension. 15. The artificial intelligence device according to claim 14, wherein the processor is configured to: acquire a prosody vector representing each of at least one speech style; and generate a prosody embedding vector having a changed speech style using the prosody vector and the condition vector having the changed condition for determining the speech style. 16. The artificial intelligence device according to claim 15, wherein the processor is configured to: acquire text data; and generate a synthesized speech based on the text data and the prosody embedding vector.
2,800
344,459
16,803,933
2,886
According to one embodiment, a variable resistance element includes a first electrode, a second electrode, and a variable resistance layer and a tellurium-containing compound layer disposed between the first electrode and the second electrode. The tellurium-containing compound layer contains tellurium, oxygen, and at least one element selected from tin, copper, and bismuth. In some examples, the tellurium-containing compound layer can function as a switching layer in a memory cell structure.
1. A variable resistance element, comprising: a first electrode; a second electrode; and a variable resistance layer and a tellurium-containing compound layer between the first electrode and the second electrode, wherein the tellurium-containing compound layer comprises tellurium, oxygen, and at least one element selected from a group consisting of tin, copper, and bismuth. 2. The variable resistance element according to claim 1, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xTeyOw, where x, y, and w are each a number greater than 0 and less than 1 indicating an atomic ratio, and M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and the relationship x+y+w=1 is satisfied. 3. The variable resistance element according to claim 2, wherein the tellurium-containing compound layer has an amorphous structure. 4. The variable resistance element according to claim 1, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xTeyOw, where x is a number indicating an atomic ratio and satisfying the relationship 0<x≤0.7, y is a number indicating an atomic ratio and satisfying the relationship 0.1≤y≤0.9, w is a number indicating an atomic ratio and satisfying the relationship 0<w≤0.6, and M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and the relationship x+y+w=1 is satisfied. 5. The variable resistance element according to claim 1, wherein the tellurium-containing compound layer further comprises at least one element selected from a group consisting of indium, gallium, and zinc. 6. The variable resistance element according to claim 5, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xM2zTeyOw, where x, y, z, and w are each a number more than 0 and less than 1 indicating an atomic ratio, M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and M2 is at least one element selected from the group consisting of indium, gallium, and zinc, and the relationship x+y+Z+w=1 is satisfied. 7. The variable resistance element according to claim 6, wherein the tellurium-containing compound layer has an amorphous structure. 8. The variable resistance element according to claim 5, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xM2zTeyOw, where x is a number indicating an atomic ratio and satisfying the relationship 0<x≤0.7, y is a number indicating an atomic ratio and satisfying the relationship 0.1≤y≤0.9, z is a number indicating an atomic ratio and satisfying the relationship 0.1≤z≤0.9, w is a number indicating an atomic ratio and satisfying the relationship 0<w≤0.6, M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and M2 is the at least one element selected from the group consisting of indium, gallium, and zinc, and the relationship x+y+z+w=1 is satisfied. 9. The variable resistance element according to claim 1, wherein the tellurium-containing compound layer has an amorphous structure. 10. The variable resistance element according to claim 1, wherein the variable resistance layer is a resistive random access memory (ReRAM) layer, a phase change memory (PCM) layer, or a magnetoresistive random access memory (MRAM) layer. 11. The variable resistance element according to claim 1, wherein the first and second electrodes are metal. 12. A memory storage device, comprising: a memory cell structure connected between a word line and a bit line, the memory cell structure comprising: a variable resistance layer and a tellurium-containing compound layer between the word line and the bit line, wherein the tellurium-containing compound layer comprises tellurium, oxygen, and at least one element selected from a group consisting of tin, copper, and bismuth. 13. The memory storage device according to claim 12, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xTeyOw, where x, y, and w are each a number greater than 0 and less than 1 indicating an atomic ratio, and M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and the relationship x+y+w=1 is satisfied. 14. The memory storage device according to claim 12, wherein the tellurium-containing compound layer has an amorphous structure. 15. The memory storage device according to claim 12, wherein the tellurium-containing compound layer further comprises at least one element selected from a group consisting of indium, gallium, and zinc. 16. The memory storage device according to claim 15, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xM2zTeyOw, where x, y, z, and w are each a number more than 0 and less than 1 indicating an atomic ratio, M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and M2 is the at least one element selected from the group consisting of indium, gallium, and zinc, and the relationship x+y+Z+w=1 is satisfied. 17. A variable resistance element, comprising: a first electrode; a second electrode; and a stacked structure between the first and second electrodes, the stacked structure including: a variable resistance layer, and a tellurium-containing compound layer, wherein the tellurium-containing compound layer comprises tellurium, oxygen, and at least one element selected from a group consisting of tin, copper, and bismuth. 18. The variable resistance element according to claim 17, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xTeyOw, where x, y, and w are each a number greater than 0 and less than 1 indicating an atomic ratio, and M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and the relationship x+y+w=1 is satisfied. 19. The variable resistance element according to claim 17, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xM2zTeyOw, where x, y, z, and w are each a number more than 0 and less than 1 indicating an atomic ratio, M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and M2 is at least one element selected from a group consisting of indium, gallium, and zinc, and the relationship x+y+Z+w=1 is satisfied.
According to one embodiment, a variable resistance element includes a first electrode, a second electrode, and a variable resistance layer and a tellurium-containing compound layer disposed between the first electrode and the second electrode. The tellurium-containing compound layer contains tellurium, oxygen, and at least one element selected from tin, copper, and bismuth. In some examples, the tellurium-containing compound layer can function as a switching layer in a memory cell structure.1. A variable resistance element, comprising: a first electrode; a second electrode; and a variable resistance layer and a tellurium-containing compound layer between the first electrode and the second electrode, wherein the tellurium-containing compound layer comprises tellurium, oxygen, and at least one element selected from a group consisting of tin, copper, and bismuth. 2. The variable resistance element according to claim 1, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xTeyOw, where x, y, and w are each a number greater than 0 and less than 1 indicating an atomic ratio, and M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and the relationship x+y+w=1 is satisfied. 3. The variable resistance element according to claim 2, wherein the tellurium-containing compound layer has an amorphous structure. 4. The variable resistance element according to claim 1, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xTeyOw, where x is a number indicating an atomic ratio and satisfying the relationship 0<x≤0.7, y is a number indicating an atomic ratio and satisfying the relationship 0.1≤y≤0.9, w is a number indicating an atomic ratio and satisfying the relationship 0<w≤0.6, and M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and the relationship x+y+w=1 is satisfied. 5. The variable resistance element according to claim 1, wherein the tellurium-containing compound layer further comprises at least one element selected from a group consisting of indium, gallium, and zinc. 6. The variable resistance element according to claim 5, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xM2zTeyOw, where x, y, z, and w are each a number more than 0 and less than 1 indicating an atomic ratio, M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and M2 is at least one element selected from the group consisting of indium, gallium, and zinc, and the relationship x+y+Z+w=1 is satisfied. 7. The variable resistance element according to claim 6, wherein the tellurium-containing compound layer has an amorphous structure. 8. The variable resistance element according to claim 5, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xM2zTeyOw, where x is a number indicating an atomic ratio and satisfying the relationship 0<x≤0.7, y is a number indicating an atomic ratio and satisfying the relationship 0.1≤y≤0.9, z is a number indicating an atomic ratio and satisfying the relationship 0.1≤z≤0.9, w is a number indicating an atomic ratio and satisfying the relationship 0<w≤0.6, M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and M2 is the at least one element selected from the group consisting of indium, gallium, and zinc, and the relationship x+y+z+w=1 is satisfied. 9. The variable resistance element according to claim 1, wherein the tellurium-containing compound layer has an amorphous structure. 10. The variable resistance element according to claim 1, wherein the variable resistance layer is a resistive random access memory (ReRAM) layer, a phase change memory (PCM) layer, or a magnetoresistive random access memory (MRAM) layer. 11. The variable resistance element according to claim 1, wherein the first and second electrodes are metal. 12. A memory storage device, comprising: a memory cell structure connected between a word line and a bit line, the memory cell structure comprising: a variable resistance layer and a tellurium-containing compound layer between the word line and the bit line, wherein the tellurium-containing compound layer comprises tellurium, oxygen, and at least one element selected from a group consisting of tin, copper, and bismuth. 13. The memory storage device according to claim 12, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xTeyOw, where x, y, and w are each a number greater than 0 and less than 1 indicating an atomic ratio, and M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and the relationship x+y+w=1 is satisfied. 14. The memory storage device according to claim 12, wherein the tellurium-containing compound layer has an amorphous structure. 15. The memory storage device according to claim 12, wherein the tellurium-containing compound layer further comprises at least one element selected from a group consisting of indium, gallium, and zinc. 16. The memory storage device according to claim 15, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xM2zTeyOw, where x, y, z, and w are each a number more than 0 and less than 1 indicating an atomic ratio, M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and M2 is the at least one element selected from the group consisting of indium, gallium, and zinc, and the relationship x+y+Z+w=1 is satisfied. 17. A variable resistance element, comprising: a first electrode; a second electrode; and a stacked structure between the first and second electrodes, the stacked structure including: a variable resistance layer, and a tellurium-containing compound layer, wherein the tellurium-containing compound layer comprises tellurium, oxygen, and at least one element selected from a group consisting of tin, copper, and bismuth. 18. The variable resistance element according to claim 17, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xTeyOw, where x, y, and w are each a number greater than 0 and less than 1 indicating an atomic ratio, and M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and the relationship x+y+w=1 is satisfied. 19. The variable resistance element according to claim 17, wherein the tellurium-containing compound layer comprises a compound having a composition represented by a general formula M1xM2zTeyOw, where x, y, z, and w are each a number more than 0 and less than 1 indicating an atomic ratio, M1 is the at least one element selected from the group consisting of tin, copper, and bismuth, and M2 is at least one element selected from a group consisting of indium, gallium, and zinc, and the relationship x+y+Z+w=1 is satisfied.
2,800
344,460
16,803,983
3,643
An illustrated view of a feeding system for assisting young animals in nursing and feeding is presented. The feeding system mimics the look, feel and size of the mother's natural nipples or teats. Also, the feeding system is useful for feeding from one (1) to four young animals, such as, but not limited to, dogs, cats, gerbils, sheep, etc. The feeding system is useful for veterinarians, animal rescue centers, breeders, zoos, etc. The feeding system is useful for encouraging instinctual feeding and provides comforting natures of a warm human touch.
1. A feeding system for assisting young animals in nursing and feeding, the system comprising: a feeding glove, the feeding glove having a plurality of finger channels, a top and an interior, wherein each of the finger channels having a tip and an orifice, wherein the orifice being an opening at the tip of the finger channels; a tubing assembly, the tubing assembly comprising: a plurality of tubes, each of the plurality of tubes having a top and a tip, wherein the tip having an orifice; a distributing tube, the distributing tube having a top and a bottom, wherein the top having an opening, and wherein the bottom being removably coupled to the top of the plurality of tubes; and a feeding container, the feeding container having a top, a bottom and an interior, wherein the interior being for containing a nutrient liquid, wherein the top having an opening, and wherein a valve coupled to an opening in the bottom of the feeding container, and wherein the valve being communicatively coupled to the opening of the top of the distributing tube. 2. The system of claim 1, wherein the feeding glove being made of a latex material. 3. The system of claim 1, wherein the feeding glove being non-disposable. 4. The system of claim 1, wherein the plurality of tubes being four (4) in number. 5. The system of claim 1, wherein the tubes being hollow. 6. The system of claim 1, wherein the tubing assembly being disposable. 7. The system of claim 1, wherein the valve being a pressure valve. 8. The system of claim 1, wherein the animals being one or more puppies. 9. The system of claim 1, wherein the animals being one or more kittens. 10. The system of claim 1, wherein feeding container being a feeding bag. 11. A method for a feeding system for assisting young animals in nursing and feeding, the method comprising: placing a hand in a feeding glove; placing each of a plurality of tubes in a finger channel of the feeding glove; pouring a liquid nutrient into the feeding container; inserting one or more finger channels of the feeding glove into a mouth of a young animal; actuate the valve using pressure from the finger on one or more of the tubes; releasing the liquid nutrient into a distributing tube from the feeding container; and de-actuation of the valve releasing pressure from the one or more tubes, wherein the liquid nutrient being stopped from entering the. 12. The method of claim 1, wherein the feeding glove being made of a latex material. 13. The method of claim 1, wherein the feeding glove being non-disposable. 14. The method of claim 1, wherein the plurality of tubes being four (4) in number. 15. The method of claim 1, wherein the tubes being hollow. 16. The method of claim 1, wherein the tubing assembly being disposable. 17. The method of claim 1, wherein the valve being a pressure valve. 18. The method of claim 1, wherein the animals being one or more puppies. 19. The method of claim 1, wherein the animals being one or more kittens. 20. The method of claim 1, wherein feeding container being a feeding bag.
An illustrated view of a feeding system for assisting young animals in nursing and feeding is presented. The feeding system mimics the look, feel and size of the mother's natural nipples or teats. Also, the feeding system is useful for feeding from one (1) to four young animals, such as, but not limited to, dogs, cats, gerbils, sheep, etc. The feeding system is useful for veterinarians, animal rescue centers, breeders, zoos, etc. The feeding system is useful for encouraging instinctual feeding and provides comforting natures of a warm human touch.1. A feeding system for assisting young animals in nursing and feeding, the system comprising: a feeding glove, the feeding glove having a plurality of finger channels, a top and an interior, wherein each of the finger channels having a tip and an orifice, wherein the orifice being an opening at the tip of the finger channels; a tubing assembly, the tubing assembly comprising: a plurality of tubes, each of the plurality of tubes having a top and a tip, wherein the tip having an orifice; a distributing tube, the distributing tube having a top and a bottom, wherein the top having an opening, and wherein the bottom being removably coupled to the top of the plurality of tubes; and a feeding container, the feeding container having a top, a bottom and an interior, wherein the interior being for containing a nutrient liquid, wherein the top having an opening, and wherein a valve coupled to an opening in the bottom of the feeding container, and wherein the valve being communicatively coupled to the opening of the top of the distributing tube. 2. The system of claim 1, wherein the feeding glove being made of a latex material. 3. The system of claim 1, wherein the feeding glove being non-disposable. 4. The system of claim 1, wherein the plurality of tubes being four (4) in number. 5. The system of claim 1, wherein the tubes being hollow. 6. The system of claim 1, wherein the tubing assembly being disposable. 7. The system of claim 1, wherein the valve being a pressure valve. 8. The system of claim 1, wherein the animals being one or more puppies. 9. The system of claim 1, wherein the animals being one or more kittens. 10. The system of claim 1, wherein feeding container being a feeding bag. 11. A method for a feeding system for assisting young animals in nursing and feeding, the method comprising: placing a hand in a feeding glove; placing each of a plurality of tubes in a finger channel of the feeding glove; pouring a liquid nutrient into the feeding container; inserting one or more finger channels of the feeding glove into a mouth of a young animal; actuate the valve using pressure from the finger on one or more of the tubes; releasing the liquid nutrient into a distributing tube from the feeding container; and de-actuation of the valve releasing pressure from the one or more tubes, wherein the liquid nutrient being stopped from entering the. 12. The method of claim 1, wherein the feeding glove being made of a latex material. 13. The method of claim 1, wherein the feeding glove being non-disposable. 14. The method of claim 1, wherein the plurality of tubes being four (4) in number. 15. The method of claim 1, wherein the tubes being hollow. 16. The method of claim 1, wherein the tubing assembly being disposable. 17. The method of claim 1, wherein the valve being a pressure valve. 18. The method of claim 1, wherein the animals being one or more puppies. 19. The method of claim 1, wherein the animals being one or more kittens. 20. The method of claim 1, wherein feeding container being a feeding bag.
3,600
344,461
16,803,958
3,643
An illustrated view of a feeding system for assisting young animals in nursing and feeding is presented. The feeding system mimics the look, feel and size of the mother's natural nipples or teats. Also, the feeding system is useful for feeding from one (1) to four young animals, such as, but not limited to, dogs, cats, gerbils, sheep, etc. The feeding system is useful for veterinarians, animal rescue centers, breeders, zoos, etc. The feeding system is useful for encouraging instinctual feeding and provides comforting natures of a warm human touch.
1. A feeding system for assisting young animals in nursing and feeding, the system comprising: a feeding glove, the feeding glove having a plurality of finger channels, a top and an interior, wherein each of the finger channels having a tip and an orifice, wherein the orifice being an opening at the tip of the finger channels; a tubing assembly, the tubing assembly comprising: a plurality of tubes, each of the plurality of tubes having a top and a tip, wherein the tip having an orifice; a distributing tube, the distributing tube having a top and a bottom, wherein the top having an opening, and wherein the bottom being removably coupled to the top of the plurality of tubes; and a feeding container, the feeding container having a top, a bottom and an interior, wherein the interior being for containing a nutrient liquid, wherein the top having an opening, and wherein a valve coupled to an opening in the bottom of the feeding container, and wherein the valve being communicatively coupled to the opening of the top of the distributing tube. 2. The system of claim 1, wherein the feeding glove being made of a latex material. 3. The system of claim 1, wherein the feeding glove being non-disposable. 4. The system of claim 1, wherein the plurality of tubes being four (4) in number. 5. The system of claim 1, wherein the tubes being hollow. 6. The system of claim 1, wherein the tubing assembly being disposable. 7. The system of claim 1, wherein the valve being a pressure valve. 8. The system of claim 1, wherein the animals being one or more puppies. 9. The system of claim 1, wherein the animals being one or more kittens. 10. The system of claim 1, wherein feeding container being a feeding bag. 11. A method for a feeding system for assisting young animals in nursing and feeding, the method comprising: placing a hand in a feeding glove; placing each of a plurality of tubes in a finger channel of the feeding glove; pouring a liquid nutrient into the feeding container; inserting one or more finger channels of the feeding glove into a mouth of a young animal; actuate the valve using pressure from the finger on one or more of the tubes; releasing the liquid nutrient into a distributing tube from the feeding container; and de-actuation of the valve releasing pressure from the one or more tubes, wherein the liquid nutrient being stopped from entering the. 12. The method of claim 1, wherein the feeding glove being made of a latex material. 13. The method of claim 1, wherein the feeding glove being non-disposable. 14. The method of claim 1, wherein the plurality of tubes being four (4) in number. 15. The method of claim 1, wherein the tubes being hollow. 16. The method of claim 1, wherein the tubing assembly being disposable. 17. The method of claim 1, wherein the valve being a pressure valve. 18. The method of claim 1, wherein the animals being one or more puppies. 19. The method of claim 1, wherein the animals being one or more kittens. 20. The method of claim 1, wherein feeding container being a feeding bag.
An illustrated view of a feeding system for assisting young animals in nursing and feeding is presented. The feeding system mimics the look, feel and size of the mother's natural nipples or teats. Also, the feeding system is useful for feeding from one (1) to four young animals, such as, but not limited to, dogs, cats, gerbils, sheep, etc. The feeding system is useful for veterinarians, animal rescue centers, breeders, zoos, etc. The feeding system is useful for encouraging instinctual feeding and provides comforting natures of a warm human touch.1. A feeding system for assisting young animals in nursing and feeding, the system comprising: a feeding glove, the feeding glove having a plurality of finger channels, a top and an interior, wherein each of the finger channels having a tip and an orifice, wherein the orifice being an opening at the tip of the finger channels; a tubing assembly, the tubing assembly comprising: a plurality of tubes, each of the plurality of tubes having a top and a tip, wherein the tip having an orifice; a distributing tube, the distributing tube having a top and a bottom, wherein the top having an opening, and wherein the bottom being removably coupled to the top of the plurality of tubes; and a feeding container, the feeding container having a top, a bottom and an interior, wherein the interior being for containing a nutrient liquid, wherein the top having an opening, and wherein a valve coupled to an opening in the bottom of the feeding container, and wherein the valve being communicatively coupled to the opening of the top of the distributing tube. 2. The system of claim 1, wherein the feeding glove being made of a latex material. 3. The system of claim 1, wherein the feeding glove being non-disposable. 4. The system of claim 1, wherein the plurality of tubes being four (4) in number. 5. The system of claim 1, wherein the tubes being hollow. 6. The system of claim 1, wherein the tubing assembly being disposable. 7. The system of claim 1, wherein the valve being a pressure valve. 8. The system of claim 1, wherein the animals being one or more puppies. 9. The system of claim 1, wherein the animals being one or more kittens. 10. The system of claim 1, wherein feeding container being a feeding bag. 11. A method for a feeding system for assisting young animals in nursing and feeding, the method comprising: placing a hand in a feeding glove; placing each of a plurality of tubes in a finger channel of the feeding glove; pouring a liquid nutrient into the feeding container; inserting one or more finger channels of the feeding glove into a mouth of a young animal; actuate the valve using pressure from the finger on one or more of the tubes; releasing the liquid nutrient into a distributing tube from the feeding container; and de-actuation of the valve releasing pressure from the one or more tubes, wherein the liquid nutrient being stopped from entering the. 12. The method of claim 1, wherein the feeding glove being made of a latex material. 13. The method of claim 1, wherein the feeding glove being non-disposable. 14. The method of claim 1, wherein the plurality of tubes being four (4) in number. 15. The method of claim 1, wherein the tubes being hollow. 16. The method of claim 1, wherein the tubing assembly being disposable. 17. The method of claim 1, wherein the valve being a pressure valve. 18. The method of claim 1, wherein the animals being one or more puppies. 19. The method of claim 1, wherein the animals being one or more kittens. 20. The method of claim 1, wherein feeding container being a feeding bag.
3,600
344,462
16,803,954
3,643
Semiconductor devices having an array of flexible connectors configured to mitigate thermomechanical stresses, and associated systems and methods, are disclosed herein. In one embodiment, a semiconductor assembly includes a substrate coupled to an array of flexible connectors. Each flexible connector can be transformed between a resting configuration and a loaded configuration. Each flexible connector can include a conductive wire electrically coupled to the substrate and a support material at least partially surrounding the conductive wire. The conductive wire can have a first shape when the flexible connector is in the resting configuration and a second, different shape when the flexible connector is in the loaded configuration.
1. A semiconductor assembly, comprising: a substrate; and an array of flexible connectors coupled to the substrate, each flexible connector transformable between a resting configuration and a loaded configuration, wherein each flexible connector includes a conductive wire electrically coupled to the substrate, the conductive wire having a first shape when the flexible connector is in the resting configuration and a second shape when the flexible connector is in the loaded configuration, the second shape differing from the first shape, and a support material at least partially surrounding the conductive wire. 2. The semiconductor assembly of claim 1 wherein the first shape is a curved, bent, folded, spiral, helical, serpentine, or zig-zag shape. 3. The semiconductor assembly of claim 1 wherein: the loaded configuration is a compressed configuration and the second shape has a greater amount of curvature than the first shape, or the loaded configuration is a stretched configuration and the second shape has a smaller amount of curvature than the first shape. 4. The semiconductor assembly of claim 1 wherein: each flexible connector is transformable between the resting configuration and a second loaded configuration, and the conductive wire has a third shape when the flexible connector is in the second loaded configuration, the third shape differing from the first and second shapes. 5. The semiconductor assembly of claim 1 wherein the conductive wire comprises a copper or gold wire. 6. The semiconductor assembly of claim 1 wherein the support material is configured to elastically deform as the flexible connector transforms between the resting configuration and the loaded configuration. 7. The semiconductor assembly of claim 1 wherein the conductive wire is embedded in the support material. 8. The semiconductor assembly of claim 7 wherein the support material comprises a polymer. 9. The semiconductor assembly of claim 7 wherein the support material comprises a curable material. 10. The semiconductor assembly of claim 1 wherein each flexible connector is transformable between the resting configuration and the loaded configuration via elastic deformation. 11. The semiconductor assembly of claim 1, further comprising a printed circuit board coupled to the substrate via the array of flexible connectors. 12. The semiconductor assembly of claim 11 wherein each flexible connector has a target length range based on a gap distance between the substrate and the printed circuit board, and wherein in operation each flexible connector can compress or extend from the target length range by 5%-75% and remain fully operational. 13. A method of manufacturing a semiconductor assembly, the method comprising: electrically coupling a first end portion of a conductive wire to a printed circuit board; surrounding at least a portion of the conductive wire with a support material; and electrically coupling a second end portion of the conductive wire to a substrate, wherein a length of the conductive wire between the first and second end portions is greater than a distance between the printed circuit board and the substrate. 14. The method of claim 13 wherein the first end portion is electrically coupled to the printed circuit board by wire bonding. 15. The method of claim 13, further comprising forming at least one curve, bend, spiral, helix, or fold in the conductive wire between the first and second end portions. 16. The method of claim 13 wherein the support material comprises a curable material, and wherein the method further comprises curing the curable material. 17. The method of claim 16 wherein the curable material is cured with heat or light. 18. The method of claim 16 wherein the curable material is cured after surrounding at least the portion of the conductive wire with the curable material. 19. The method of claim 13, further comprising delivering the conductive wire and the support material from a nozzle of a manufacturing device. 20. The method of claim 19, further comprising moving the nozzle along a predetermined trajectory as the conductive wire is delivered therefrom so as to form at least one curve, bend, spiral, helix, or fold in the conductive wire. 21. The method of claim 19 wherein the conductive wire is delivered from an inner lumen of the nozzle and the support material is delivered from an outer lumen of the nozzle. 22. The method of claim 19 wherein the conductive wire is delivered from the nozzle before the support material is delivered from the nozzle.
Semiconductor devices having an array of flexible connectors configured to mitigate thermomechanical stresses, and associated systems and methods, are disclosed herein. In one embodiment, a semiconductor assembly includes a substrate coupled to an array of flexible connectors. Each flexible connector can be transformed between a resting configuration and a loaded configuration. Each flexible connector can include a conductive wire electrically coupled to the substrate and a support material at least partially surrounding the conductive wire. The conductive wire can have a first shape when the flexible connector is in the resting configuration and a second, different shape when the flexible connector is in the loaded configuration.1. A semiconductor assembly, comprising: a substrate; and an array of flexible connectors coupled to the substrate, each flexible connector transformable between a resting configuration and a loaded configuration, wherein each flexible connector includes a conductive wire electrically coupled to the substrate, the conductive wire having a first shape when the flexible connector is in the resting configuration and a second shape when the flexible connector is in the loaded configuration, the second shape differing from the first shape, and a support material at least partially surrounding the conductive wire. 2. The semiconductor assembly of claim 1 wherein the first shape is a curved, bent, folded, spiral, helical, serpentine, or zig-zag shape. 3. The semiconductor assembly of claim 1 wherein: the loaded configuration is a compressed configuration and the second shape has a greater amount of curvature than the first shape, or the loaded configuration is a stretched configuration and the second shape has a smaller amount of curvature than the first shape. 4. The semiconductor assembly of claim 1 wherein: each flexible connector is transformable between the resting configuration and a second loaded configuration, and the conductive wire has a third shape when the flexible connector is in the second loaded configuration, the third shape differing from the first and second shapes. 5. The semiconductor assembly of claim 1 wherein the conductive wire comprises a copper or gold wire. 6. The semiconductor assembly of claim 1 wherein the support material is configured to elastically deform as the flexible connector transforms between the resting configuration and the loaded configuration. 7. The semiconductor assembly of claim 1 wherein the conductive wire is embedded in the support material. 8. The semiconductor assembly of claim 7 wherein the support material comprises a polymer. 9. The semiconductor assembly of claim 7 wherein the support material comprises a curable material. 10. The semiconductor assembly of claim 1 wherein each flexible connector is transformable between the resting configuration and the loaded configuration via elastic deformation. 11. The semiconductor assembly of claim 1, further comprising a printed circuit board coupled to the substrate via the array of flexible connectors. 12. The semiconductor assembly of claim 11 wherein each flexible connector has a target length range based on a gap distance between the substrate and the printed circuit board, and wherein in operation each flexible connector can compress or extend from the target length range by 5%-75% and remain fully operational. 13. A method of manufacturing a semiconductor assembly, the method comprising: electrically coupling a first end portion of a conductive wire to a printed circuit board; surrounding at least a portion of the conductive wire with a support material; and electrically coupling a second end portion of the conductive wire to a substrate, wherein a length of the conductive wire between the first and second end portions is greater than a distance between the printed circuit board and the substrate. 14. The method of claim 13 wherein the first end portion is electrically coupled to the printed circuit board by wire bonding. 15. The method of claim 13, further comprising forming at least one curve, bend, spiral, helix, or fold in the conductive wire between the first and second end portions. 16. The method of claim 13 wherein the support material comprises a curable material, and wherein the method further comprises curing the curable material. 17. The method of claim 16 wherein the curable material is cured with heat or light. 18. The method of claim 16 wherein the curable material is cured after surrounding at least the portion of the conductive wire with the curable material. 19. The method of claim 13, further comprising delivering the conductive wire and the support material from a nozzle of a manufacturing device. 20. The method of claim 19, further comprising moving the nozzle along a predetermined trajectory as the conductive wire is delivered therefrom so as to form at least one curve, bend, spiral, helix, or fold in the conductive wire. 21. The method of claim 19 wherein the conductive wire is delivered from an inner lumen of the nozzle and the support material is delivered from an outer lumen of the nozzle. 22. The method of claim 19 wherein the conductive wire is delivered from the nozzle before the support material is delivered from the nozzle.
3,600
344,463
16,803,960
3,643
Semiconductor devices having an array of flexible connectors configured to mitigate thermomechanical stresses, and associated systems and methods, are disclosed herein. In one embodiment, a semiconductor assembly includes a substrate coupled to an array of flexible connectors. Each flexible connector can be transformed between a resting configuration and a loaded configuration. Each flexible connector can include a conductive wire electrically coupled to the substrate and a support material at least partially surrounding the conductive wire. The conductive wire can have a first shape when the flexible connector is in the resting configuration and a second, different shape when the flexible connector is in the loaded configuration.
1. A semiconductor assembly, comprising: a substrate; and an array of flexible connectors coupled to the substrate, each flexible connector transformable between a resting configuration and a loaded configuration, wherein each flexible connector includes a conductive wire electrically coupled to the substrate, the conductive wire having a first shape when the flexible connector is in the resting configuration and a second shape when the flexible connector is in the loaded configuration, the second shape differing from the first shape, and a support material at least partially surrounding the conductive wire. 2. The semiconductor assembly of claim 1 wherein the first shape is a curved, bent, folded, spiral, helical, serpentine, or zig-zag shape. 3. The semiconductor assembly of claim 1 wherein: the loaded configuration is a compressed configuration and the second shape has a greater amount of curvature than the first shape, or the loaded configuration is a stretched configuration and the second shape has a smaller amount of curvature than the first shape. 4. The semiconductor assembly of claim 1 wherein: each flexible connector is transformable between the resting configuration and a second loaded configuration, and the conductive wire has a third shape when the flexible connector is in the second loaded configuration, the third shape differing from the first and second shapes. 5. The semiconductor assembly of claim 1 wherein the conductive wire comprises a copper or gold wire. 6. The semiconductor assembly of claim 1 wherein the support material is configured to elastically deform as the flexible connector transforms between the resting configuration and the loaded configuration. 7. The semiconductor assembly of claim 1 wherein the conductive wire is embedded in the support material. 8. The semiconductor assembly of claim 7 wherein the support material comprises a polymer. 9. The semiconductor assembly of claim 7 wherein the support material comprises a curable material. 10. The semiconductor assembly of claim 1 wherein each flexible connector is transformable between the resting configuration and the loaded configuration via elastic deformation. 11. The semiconductor assembly of claim 1, further comprising a printed circuit board coupled to the substrate via the array of flexible connectors. 12. The semiconductor assembly of claim 11 wherein each flexible connector has a target length range based on a gap distance between the substrate and the printed circuit board, and wherein in operation each flexible connector can compress or extend from the target length range by 5%-75% and remain fully operational. 13. A method of manufacturing a semiconductor assembly, the method comprising: electrically coupling a first end portion of a conductive wire to a printed circuit board; surrounding at least a portion of the conductive wire with a support material; and electrically coupling a second end portion of the conductive wire to a substrate, wherein a length of the conductive wire between the first and second end portions is greater than a distance between the printed circuit board and the substrate. 14. The method of claim 13 wherein the first end portion is electrically coupled to the printed circuit board by wire bonding. 15. The method of claim 13, further comprising forming at least one curve, bend, spiral, helix, or fold in the conductive wire between the first and second end portions. 16. The method of claim 13 wherein the support material comprises a curable material, and wherein the method further comprises curing the curable material. 17. The method of claim 16 wherein the curable material is cured with heat or light. 18. The method of claim 16 wherein the curable material is cured after surrounding at least the portion of the conductive wire with the curable material. 19. The method of claim 13, further comprising delivering the conductive wire and the support material from a nozzle of a manufacturing device. 20. The method of claim 19, further comprising moving the nozzle along a predetermined trajectory as the conductive wire is delivered therefrom so as to form at least one curve, bend, spiral, helix, or fold in the conductive wire. 21. The method of claim 19 wherein the conductive wire is delivered from an inner lumen of the nozzle and the support material is delivered from an outer lumen of the nozzle. 22. The method of claim 19 wherein the conductive wire is delivered from the nozzle before the support material is delivered from the nozzle.
Semiconductor devices having an array of flexible connectors configured to mitigate thermomechanical stresses, and associated systems and methods, are disclosed herein. In one embodiment, a semiconductor assembly includes a substrate coupled to an array of flexible connectors. Each flexible connector can be transformed between a resting configuration and a loaded configuration. Each flexible connector can include a conductive wire electrically coupled to the substrate and a support material at least partially surrounding the conductive wire. The conductive wire can have a first shape when the flexible connector is in the resting configuration and a second, different shape when the flexible connector is in the loaded configuration.1. A semiconductor assembly, comprising: a substrate; and an array of flexible connectors coupled to the substrate, each flexible connector transformable between a resting configuration and a loaded configuration, wherein each flexible connector includes a conductive wire electrically coupled to the substrate, the conductive wire having a first shape when the flexible connector is in the resting configuration and a second shape when the flexible connector is in the loaded configuration, the second shape differing from the first shape, and a support material at least partially surrounding the conductive wire. 2. The semiconductor assembly of claim 1 wherein the first shape is a curved, bent, folded, spiral, helical, serpentine, or zig-zag shape. 3. The semiconductor assembly of claim 1 wherein: the loaded configuration is a compressed configuration and the second shape has a greater amount of curvature than the first shape, or the loaded configuration is a stretched configuration and the second shape has a smaller amount of curvature than the first shape. 4. The semiconductor assembly of claim 1 wherein: each flexible connector is transformable between the resting configuration and a second loaded configuration, and the conductive wire has a third shape when the flexible connector is in the second loaded configuration, the third shape differing from the first and second shapes. 5. The semiconductor assembly of claim 1 wherein the conductive wire comprises a copper or gold wire. 6. The semiconductor assembly of claim 1 wherein the support material is configured to elastically deform as the flexible connector transforms between the resting configuration and the loaded configuration. 7. The semiconductor assembly of claim 1 wherein the conductive wire is embedded in the support material. 8. The semiconductor assembly of claim 7 wherein the support material comprises a polymer. 9. The semiconductor assembly of claim 7 wherein the support material comprises a curable material. 10. The semiconductor assembly of claim 1 wherein each flexible connector is transformable between the resting configuration and the loaded configuration via elastic deformation. 11. The semiconductor assembly of claim 1, further comprising a printed circuit board coupled to the substrate via the array of flexible connectors. 12. The semiconductor assembly of claim 11 wherein each flexible connector has a target length range based on a gap distance between the substrate and the printed circuit board, and wherein in operation each flexible connector can compress or extend from the target length range by 5%-75% and remain fully operational. 13. A method of manufacturing a semiconductor assembly, the method comprising: electrically coupling a first end portion of a conductive wire to a printed circuit board; surrounding at least a portion of the conductive wire with a support material; and electrically coupling a second end portion of the conductive wire to a substrate, wherein a length of the conductive wire between the first and second end portions is greater than a distance between the printed circuit board and the substrate. 14. The method of claim 13 wherein the first end portion is electrically coupled to the printed circuit board by wire bonding. 15. The method of claim 13, further comprising forming at least one curve, bend, spiral, helix, or fold in the conductive wire between the first and second end portions. 16. The method of claim 13 wherein the support material comprises a curable material, and wherein the method further comprises curing the curable material. 17. The method of claim 16 wherein the curable material is cured with heat or light. 18. The method of claim 16 wherein the curable material is cured after surrounding at least the portion of the conductive wire with the curable material. 19. The method of claim 13, further comprising delivering the conductive wire and the support material from a nozzle of a manufacturing device. 20. The method of claim 19, further comprising moving the nozzle along a predetermined trajectory as the conductive wire is delivered therefrom so as to form at least one curve, bend, spiral, helix, or fold in the conductive wire. 21. The method of claim 19 wherein the conductive wire is delivered from an inner lumen of the nozzle and the support material is delivered from an outer lumen of the nozzle. 22. The method of claim 19 wherein the conductive wire is delivered from the nozzle before the support material is delivered from the nozzle.
3,600
344,464
16,803,976
3,643
Systems and methods for reconstructing a trajectory from anonymized data are provided. In some aspects, a method includes receiving anonymized data corresponding to a trajectory of a user or object, and assembling, based on the anonymized data, a state-space model. The method also includes executing a prediction algorithm, based on the state-space model, to generate predicted data from the anonymized data, and reconstructing the trajectory of the user or object using the predicted data. The method further includes generating a report indicative of the trajectory.
1. A method for reconstructing a trajectory from anonymized data, the method comprising: receiving anonymized data corresponding to a trajectory of a user or object along a road network; assembling, based on the anonymized data, a state-space model having a state representation that corresponds to the road network; executing a discrete prediction algorithm, based on the state-space model, to generate predicted data from the anonymized data; linking the predicted data to reconstruct the trajectory of the user or object; and generating a report indicative of the trajectory. 2. The method of claim 1, wherein the method further comprises generating the anonymized data using a split-gap technique. 3. The method of claim 1, wherein the method further comprises matching the anonymized data to a map of the road network, the map comprising a plurality of links and nodes. 4. The method of claim 1, wherein the method further comprises generating the predicted data by determining a maximum distance that is reachable from a trajectory segment in the anonymized data, each trajectory segment comprising one or more links. 5. The method of claim 4, wherein the method further comprises determining the maximum distance using a speed profile of the user or object and a predetermined future time point. 6. The method of claim 4, wherein the method further comprises using the anonymized data to generate probability scores, wherein each probability score corresponds to a likelihood of transitioning between two or more links along the road network. 7. The method of claim 6, wherein the method further comprises estimating the probability scores using a combination of probe data, road map data, and historical data. 8. The method of claim 6, wherein the method further comprises generating the predicted data by filtering out links falling within a region of the road network defined by maximum distance. 9. The method of claim 1, wherein the method further comprises reconstructing the trajectory by linking together trajectory segments based on a combination of timestamp, speed and location constraints, or based on probability scores, or both. 10. The method of claim 1, wherein the method further comprises characterizing, based on the trajectory, an anonymization technique used to generate the anonymized data. 11. A system for reconstructing a trajectory from anonymized data, the system comprising: at least one processor; at least one memory comprising instructions executable by the at least one processor, the instructions causing the system to: access anonymized data corresponding to a trajectory of a user or object along a road network; assemble, based on the anonymized data, a state-space model having a state representation that corresponds to the road network; execute a discrete prediction algorithm, based on the state-space model, to generate predicted data from the anonymized data; link the predicted data to reconstruct the trajectory of the user or object; and generate a report indicative of the trajectory; and a display for providing the report. 12. The system of claim 11, wherein the instructions further cause the system to generate the anonymized data using a split-gap technique. 13. The system of claim 11, wherein the instructions further cause the system to match the anonymized data to a map of the road network, the map comprising a plurality of links and nodes. 14. The system of claim 11, wherein the instructions further cause the system to generate the predicted data by determining a maximum distance that is reachable from a trajectory segment in the anonymized data, each trajectory segment comprising one or more links. 15. The system of claim 14, wherein the instructions further cause the system to determine the maximum distance using a speed profile of the user or object and a predetermined future time point. 16. The system of claim 14, wherein the instructions further cause the system to use the anonymized data to generate probability scores, wherein each probability score corresponds to a likelihood of transitioning between two or more links along the road network. 17. The system of claim 16, wherein the instructions further cause the system to estimate the probability scores using a combination of probe data, road map data, and historical data, or based on probability scores, or both. 18. The system of claim 16, wherein the instructions further cause the system to generate the predicted data by filtering out links falling within a region of the road network defined by maximum distance. 19. The system of claim 11, wherein the instructions further cause the system to reconstruct the trajectory by linking together trajectory segments based on a combination of timestamp, speed and location constraints. 20. A non-transitory computer-readable storage medium for reconstructing a trajectory from anonymized data, carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to perform steps to: access anonymized data corresponding to a trajectory of a user or object along a road network; assemble, based on the anonymized data, a state-space model having a state representation that corresponds to the road network; execute a discrete prediction algorithm, based on the state-space model, to generate predicted data from the anonymized data; link the predicted data to reconstruct the trajectory of the user or object; and generate a report indicative of the trajectory.
Systems and methods for reconstructing a trajectory from anonymized data are provided. In some aspects, a method includes receiving anonymized data corresponding to a trajectory of a user or object, and assembling, based on the anonymized data, a state-space model. The method also includes executing a prediction algorithm, based on the state-space model, to generate predicted data from the anonymized data, and reconstructing the trajectory of the user or object using the predicted data. The method further includes generating a report indicative of the trajectory.1. A method for reconstructing a trajectory from anonymized data, the method comprising: receiving anonymized data corresponding to a trajectory of a user or object along a road network; assembling, based on the anonymized data, a state-space model having a state representation that corresponds to the road network; executing a discrete prediction algorithm, based on the state-space model, to generate predicted data from the anonymized data; linking the predicted data to reconstruct the trajectory of the user or object; and generating a report indicative of the trajectory. 2. The method of claim 1, wherein the method further comprises generating the anonymized data using a split-gap technique. 3. The method of claim 1, wherein the method further comprises matching the anonymized data to a map of the road network, the map comprising a plurality of links and nodes. 4. The method of claim 1, wherein the method further comprises generating the predicted data by determining a maximum distance that is reachable from a trajectory segment in the anonymized data, each trajectory segment comprising one or more links. 5. The method of claim 4, wherein the method further comprises determining the maximum distance using a speed profile of the user or object and a predetermined future time point. 6. The method of claim 4, wherein the method further comprises using the anonymized data to generate probability scores, wherein each probability score corresponds to a likelihood of transitioning between two or more links along the road network. 7. The method of claim 6, wherein the method further comprises estimating the probability scores using a combination of probe data, road map data, and historical data. 8. The method of claim 6, wherein the method further comprises generating the predicted data by filtering out links falling within a region of the road network defined by maximum distance. 9. The method of claim 1, wherein the method further comprises reconstructing the trajectory by linking together trajectory segments based on a combination of timestamp, speed and location constraints, or based on probability scores, or both. 10. The method of claim 1, wherein the method further comprises characterizing, based on the trajectory, an anonymization technique used to generate the anonymized data. 11. A system for reconstructing a trajectory from anonymized data, the system comprising: at least one processor; at least one memory comprising instructions executable by the at least one processor, the instructions causing the system to: access anonymized data corresponding to a trajectory of a user or object along a road network; assemble, based on the anonymized data, a state-space model having a state representation that corresponds to the road network; execute a discrete prediction algorithm, based on the state-space model, to generate predicted data from the anonymized data; link the predicted data to reconstruct the trajectory of the user or object; and generate a report indicative of the trajectory; and a display for providing the report. 12. The system of claim 11, wherein the instructions further cause the system to generate the anonymized data using a split-gap technique. 13. The system of claim 11, wherein the instructions further cause the system to match the anonymized data to a map of the road network, the map comprising a plurality of links and nodes. 14. The system of claim 11, wherein the instructions further cause the system to generate the predicted data by determining a maximum distance that is reachable from a trajectory segment in the anonymized data, each trajectory segment comprising one or more links. 15. The system of claim 14, wherein the instructions further cause the system to determine the maximum distance using a speed profile of the user or object and a predetermined future time point. 16. The system of claim 14, wherein the instructions further cause the system to use the anonymized data to generate probability scores, wherein each probability score corresponds to a likelihood of transitioning between two or more links along the road network. 17. The system of claim 16, wherein the instructions further cause the system to estimate the probability scores using a combination of probe data, road map data, and historical data, or based on probability scores, or both. 18. The system of claim 16, wherein the instructions further cause the system to generate the predicted data by filtering out links falling within a region of the road network defined by maximum distance. 19. The system of claim 11, wherein the instructions further cause the system to reconstruct the trajectory by linking together trajectory segments based on a combination of timestamp, speed and location constraints. 20. A non-transitory computer-readable storage medium for reconstructing a trajectory from anonymized data, carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to perform steps to: access anonymized data corresponding to a trajectory of a user or object along a road network; assemble, based on the anonymized data, a state-space model having a state representation that corresponds to the road network; execute a discrete prediction algorithm, based on the state-space model, to generate predicted data from the anonymized data; link the predicted data to reconstruct the trajectory of the user or object; and generate a report indicative of the trajectory.
3,600
344,465
16,803,986
3,734
A box includes a lid having a handle, wherein the handle comprises at one end thereof a toggle, and wherein a wall of the box comprises an opening through which the toggle of the handle is received for securing the lid in a closed position. Also disclosed is the combination of a box, a handle, and a clip, wherein the clip is secured onto a front wall of the box and a toggle of the handle is latched onto the clip for securing the lid of the box in a closed position.
1. A box comprising a lid having a handle, wherein the handle comprises at one end thereof a toggle, and wherein a front wall of the box defines a passage through which the toggle of the handle passes for securing the lid in a closed position, wherein lifting of the box by the handle tensions the handle and secures the front wall to the lid in the closed position. 2. The box of claim 1, wherein a second end of the handle comprises a second toggle, and wherein the lid comprises an opening through which the second toggle is passed for attaching the handle to the lid. 3. The box of claim 1, wherein the lid further comprises a flap portion having an opening through which the handle extends for positioning the first toggle proximate the passage defined in the front wall of the box when the lid is transitioned toward the closed position. 4-16. (canceled) 17. The box of claim 3, wherein the front wall of the box extends above the lid when the lid is in the closed position. 18. The box of claim 17, wherein the passage extends to a top edge of the front wall of the box. 19. The box of claim 18, wherein the passage extends below the lid when the lid is in the closed position. 20. The box of claim 19, wherein the handle when tensioned during lifting of the box latches to the front wall of the box and secures the front wall to the lid in the closed position. 21. The box of claim 20, wherein the handle is dimensioned such that, when the toggle is in a first orientation, the handle has a width that is small enough to pass through the passage defined in the front wall of the box, and when the toggle is in a second orientation that is orthogonal to the first orientation, the handle has a width that is too large to pass through the passage defined in the front wall of the box. 22. The box of claim 21, wherein the toggle extends beyond and on opposite lateral sides of the passage when the toggle is in the second orientation when the handle secures the lid in the closed position. 23. A box comprising a lid, a front wall, and means for lifting the box while effecting securing the lid of the box in a closed position. 24. The box of claim 23, wherein the means comprises a handle that is latched at a first end to the front wall; that is latched at a second, opposite end to the lid; and that is tensioned when the box is lifted using the handle. 25. The box of claim 24, wherein the handle proximate the first end extends through both an opening in the lid and an opening in the front wall. 26. The box of claim 25, wherein the handle proximate the second end extends through another opening in the lid. 27. The box of claim 25, wherein lid comprises a flap portion that defines the opening in the lid through which extends the handle proximate the first end. 28. The box of claim 27, wherein the front wall of the box extends above the lid when the lid is in the closed position. 29. A box (a) comprising a single sheet of corrugated material folded and glued to define a lid, a front wall, a back wall, a first side wall, a second side wall, and a bottom wall, and (b) further comprising a handle having at one end thereof a toggle, (c) wherein the front wall of the box defines a passage through which the toggle of the handle passes for securing the lid in a closed position, and (d) wherein lifting of the box by the handle tensions the handle and secures the front wall to the lid in the closed position. 30. The box of claim 29, wherein a second end of the handle comprises a second toggle, and wherein the lid comprises an opening through which the second toggle is passed for attaching the handle to the lid. 31. The box of claim 29, wherein the lid further comprises a flap portion having an opening through which the handle extends for positioning the first toggle proximate the passage defined in the front wall of the box when the lid is transitioned toward the closed position. 32. The box of claim 31, wherein the front wall of the box extends above the lid when the lid is in the closed position; wherein the passage extends to a top edge of the front wall of the box; and wherein the passage extends below the lid when the lid is in the closed position. 33. The box of claim 32, wherein the handle when tensioned during lifting of the box latches to the front wall of the box and secures the front wall to the lid in the closed position; wherein the handle is dimensioned such that, when the toggle is in a first orientation, the handle has a width that is small enough to pass through the passage defined in the front wall of the box, and when the toggle is in a second orientation that is orthogonal to the first orientation, the handle has a width that is too large to pass through the passage defined in the front wall of the box; and wherein the toggle extends beyond and on opposite lateral sides of the passage when the toggle is in the second orientation when the handle secures the lid in the closed position.
A box includes a lid having a handle, wherein the handle comprises at one end thereof a toggle, and wherein a wall of the box comprises an opening through which the toggle of the handle is received for securing the lid in a closed position. Also disclosed is the combination of a box, a handle, and a clip, wherein the clip is secured onto a front wall of the box and a toggle of the handle is latched onto the clip for securing the lid of the box in a closed position.1. A box comprising a lid having a handle, wherein the handle comprises at one end thereof a toggle, and wherein a front wall of the box defines a passage through which the toggle of the handle passes for securing the lid in a closed position, wherein lifting of the box by the handle tensions the handle and secures the front wall to the lid in the closed position. 2. The box of claim 1, wherein a second end of the handle comprises a second toggle, and wherein the lid comprises an opening through which the second toggle is passed for attaching the handle to the lid. 3. The box of claim 1, wherein the lid further comprises a flap portion having an opening through which the handle extends for positioning the first toggle proximate the passage defined in the front wall of the box when the lid is transitioned toward the closed position. 4-16. (canceled) 17. The box of claim 3, wherein the front wall of the box extends above the lid when the lid is in the closed position. 18. The box of claim 17, wherein the passage extends to a top edge of the front wall of the box. 19. The box of claim 18, wherein the passage extends below the lid when the lid is in the closed position. 20. The box of claim 19, wherein the handle when tensioned during lifting of the box latches to the front wall of the box and secures the front wall to the lid in the closed position. 21. The box of claim 20, wherein the handle is dimensioned such that, when the toggle is in a first orientation, the handle has a width that is small enough to pass through the passage defined in the front wall of the box, and when the toggle is in a second orientation that is orthogonal to the first orientation, the handle has a width that is too large to pass through the passage defined in the front wall of the box. 22. The box of claim 21, wherein the toggle extends beyond and on opposite lateral sides of the passage when the toggle is in the second orientation when the handle secures the lid in the closed position. 23. A box comprising a lid, a front wall, and means for lifting the box while effecting securing the lid of the box in a closed position. 24. The box of claim 23, wherein the means comprises a handle that is latched at a first end to the front wall; that is latched at a second, opposite end to the lid; and that is tensioned when the box is lifted using the handle. 25. The box of claim 24, wherein the handle proximate the first end extends through both an opening in the lid and an opening in the front wall. 26. The box of claim 25, wherein the handle proximate the second end extends through another opening in the lid. 27. The box of claim 25, wherein lid comprises a flap portion that defines the opening in the lid through which extends the handle proximate the first end. 28. The box of claim 27, wherein the front wall of the box extends above the lid when the lid is in the closed position. 29. A box (a) comprising a single sheet of corrugated material folded and glued to define a lid, a front wall, a back wall, a first side wall, a second side wall, and a bottom wall, and (b) further comprising a handle having at one end thereof a toggle, (c) wherein the front wall of the box defines a passage through which the toggle of the handle passes for securing the lid in a closed position, and (d) wherein lifting of the box by the handle tensions the handle and secures the front wall to the lid in the closed position. 30. The box of claim 29, wherein a second end of the handle comprises a second toggle, and wherein the lid comprises an opening through which the second toggle is passed for attaching the handle to the lid. 31. The box of claim 29, wherein the lid further comprises a flap portion having an opening through which the handle extends for positioning the first toggle proximate the passage defined in the front wall of the box when the lid is transitioned toward the closed position. 32. The box of claim 31, wherein the front wall of the box extends above the lid when the lid is in the closed position; wherein the passage extends to a top edge of the front wall of the box; and wherein the passage extends below the lid when the lid is in the closed position. 33. The box of claim 32, wherein the handle when tensioned during lifting of the box latches to the front wall of the box and secures the front wall to the lid in the closed position; wherein the handle is dimensioned such that, when the toggle is in a first orientation, the handle has a width that is small enough to pass through the passage defined in the front wall of the box, and when the toggle is in a second orientation that is orthogonal to the first orientation, the handle has a width that is too large to pass through the passage defined in the front wall of the box; and wherein the toggle extends beyond and on opposite lateral sides of the passage when the toggle is in the second orientation when the handle secures the lid in the closed position.
3,700
344,466
16,803,968
1,655
The present invention provides a pharmaceutical composition and health functional food composition for preventing or treating female menopausal disease including extract of Ribes fasciculatum leaves as an active ingredient, and a pharmaceutical composition and health functional food composition for preventing or treating female menopausal disease including an extract of Cornus officinalis and extract of Ribes fasciculatum leaves as active ingredients.
1. A method of preventing or treating female menopausal disease in a subject in need thereof, comprising: providing a pharmaceutical composition comprising extract of Ribes fasciculatum leaves as an active ingredient; and administering the pharmaceutical composition to the subject, wherein the female menopausal disease is prevented or treated. 2. A method of preventing or treating female menopausal disease in a subject in need thereof, comprising: providing a pharmaceutical composition comprising extract of Cornus officinalis and extract of Ribes fasciculatum leaves as active ingredients; and administering the pharmaceutical composition to the subject, wherein the female menopausal disease is prevented or treated. 3. The method of claim 1, wherein the extract is extracted with a solvent of a C1 to C4 alcohol or an aqueous solution thereof. 4. The method of claim 2, wherein the pharmaceutical composition is obtained by mixing the extract of Cornus officinalis and the extract of Ribes fasciculatum leaves in a weight ratio of 6:4 to 8:2. 5. The method of claim 1, wherein the female menopausal diseases include symptoms according to decreased estrogen secretion. 6. The method of claim 1, wherein the female menopausal disease is at least one selected from the group consisting of contraction or degeneration of uterus, fatty liver, abdominal obesity, weight gain, osteoporosis, hot flashes, sweating, insomnia, nervousness, depression, dizziness, lack of concentration, short-term memory disorders, anxiety, memory loss, palpitations, myalgia, joint pain, skin dryness, vaginal dryness, vaginal atrophy, lower urethral atrophy, vaginitis, cystitis, urination pain, urination, hyperlipidemia and arteriosclerosis. 7. (canceled) 8. A method of preventing or improving female menopausal disease in a subject in need thereof, comprising: providing a health functional food composition comprising extract of Cornus officinalis and extract of Ribes fasciculatum leaves as active ingredients; and administering the health functional food composition to the subject, wherein the female menopausal disease is prevented or improved. 9. The method of claim 8, wherein the health functional food composition is obtained by mixing the extract of Cornus officinalis and the extract of Ribes fasciculatum leaves in a weight ratio of 6:4 to 8:2. 10. The method of claim 8, wherein the female menopausal diseases include symptoms according to decreased estrogen secretion. 11. The method of claim 8, wherein the female menopausal disease is at least one selected from the group consisting of contraction or degeneration of uterus, fatty liver, abdominal obesity, weight gain, osteoporosis, hot flashes, sweating, insomnia, nervousness, depression, dizziness, lack of concentration, short-term memory disorders, anxiety, memory loss, palpitations, myalgia, joint pain, skin dryness, vaginal dryness, vaginal atrophy, lower urethral atrophy, vaginitis, cystitis, urination pain, urination, hyperlipidemia and arteriosclerosis. 12. The method of claim 2, wherein the extract is extracted with a solvent of a C1 to C4 alcohol or an aqueous solution thereof. 13. The method of claim 2, wherein the female menopausal diseases include symptoms according to decreased estrogen secretion. 14. The method claim 2, wherein the female menopausal disease is at least one selected from the group consisting of contraction or degeneration of uterus, fatty liver, abdominal obesity, weight gain, osteoporosis, hot flashes, sweating, insomnia, nervousness, depression, dizziness, lack of concentration, short-term memory disorders, anxiety, memory loss, palpitations, myalgia, joint pain, skin dryness, vaginal dryness, vaginal atrophy, lower urethral atrophy, vaginitis, cystitis, urination pain, urination, hyperlipidemia and arteriosclerosis.
The present invention provides a pharmaceutical composition and health functional food composition for preventing or treating female menopausal disease including extract of Ribes fasciculatum leaves as an active ingredient, and a pharmaceutical composition and health functional food composition for preventing or treating female menopausal disease including an extract of Cornus officinalis and extract of Ribes fasciculatum leaves as active ingredients.1. A method of preventing or treating female menopausal disease in a subject in need thereof, comprising: providing a pharmaceutical composition comprising extract of Ribes fasciculatum leaves as an active ingredient; and administering the pharmaceutical composition to the subject, wherein the female menopausal disease is prevented or treated. 2. A method of preventing or treating female menopausal disease in a subject in need thereof, comprising: providing a pharmaceutical composition comprising extract of Cornus officinalis and extract of Ribes fasciculatum leaves as active ingredients; and administering the pharmaceutical composition to the subject, wherein the female menopausal disease is prevented or treated. 3. The method of claim 1, wherein the extract is extracted with a solvent of a C1 to C4 alcohol or an aqueous solution thereof. 4. The method of claim 2, wherein the pharmaceutical composition is obtained by mixing the extract of Cornus officinalis and the extract of Ribes fasciculatum leaves in a weight ratio of 6:4 to 8:2. 5. The method of claim 1, wherein the female menopausal diseases include symptoms according to decreased estrogen secretion. 6. The method of claim 1, wherein the female menopausal disease is at least one selected from the group consisting of contraction or degeneration of uterus, fatty liver, abdominal obesity, weight gain, osteoporosis, hot flashes, sweating, insomnia, nervousness, depression, dizziness, lack of concentration, short-term memory disorders, anxiety, memory loss, palpitations, myalgia, joint pain, skin dryness, vaginal dryness, vaginal atrophy, lower urethral atrophy, vaginitis, cystitis, urination pain, urination, hyperlipidemia and arteriosclerosis. 7. (canceled) 8. A method of preventing or improving female menopausal disease in a subject in need thereof, comprising: providing a health functional food composition comprising extract of Cornus officinalis and extract of Ribes fasciculatum leaves as active ingredients; and administering the health functional food composition to the subject, wherein the female menopausal disease is prevented or improved. 9. The method of claim 8, wherein the health functional food composition is obtained by mixing the extract of Cornus officinalis and the extract of Ribes fasciculatum leaves in a weight ratio of 6:4 to 8:2. 10. The method of claim 8, wherein the female menopausal diseases include symptoms according to decreased estrogen secretion. 11. The method of claim 8, wherein the female menopausal disease is at least one selected from the group consisting of contraction or degeneration of uterus, fatty liver, abdominal obesity, weight gain, osteoporosis, hot flashes, sweating, insomnia, nervousness, depression, dizziness, lack of concentration, short-term memory disorders, anxiety, memory loss, palpitations, myalgia, joint pain, skin dryness, vaginal dryness, vaginal atrophy, lower urethral atrophy, vaginitis, cystitis, urination pain, urination, hyperlipidemia and arteriosclerosis. 12. The method of claim 2, wherein the extract is extracted with a solvent of a C1 to C4 alcohol or an aqueous solution thereof. 13. The method of claim 2, wherein the female menopausal diseases include symptoms according to decreased estrogen secretion. 14. The method claim 2, wherein the female menopausal disease is at least one selected from the group consisting of contraction or degeneration of uterus, fatty liver, abdominal obesity, weight gain, osteoporosis, hot flashes, sweating, insomnia, nervousness, depression, dizziness, lack of concentration, short-term memory disorders, anxiety, memory loss, palpitations, myalgia, joint pain, skin dryness, vaginal dryness, vaginal atrophy, lower urethral atrophy, vaginitis, cystitis, urination pain, urination, hyperlipidemia and arteriosclerosis.
1,600
344,467
16,803,944
1,655
The disclosed embodiments include a method performed by a data intake and query system. The method includes populating each metric including a measure value, cataloging metadata in an in-memory metrics catalog, where the metadata is related to the metrics. The method further includes receiving a search query including search criteria, evaluating the search query by applying the search criteria to the metadata of the metrics catalog to obtain results that satisfy the search criteria, and causing display, on a display device, of the results or data indicative of the results.
1. A method comprising: populating, by a data intake and query system, a metrics store with a plurality of metrics, each metric of the plurality of metrics including a measure value; storing, by the data intake and query system, metadata in an in-memory metrics catalog, the metadata corresponding to a specified condition associated with a metric of the plurality of metrics; receiving, by the data intake and query system, a search query including a search criterion; evaluating, by the data intake and query system, the search query by applying the search criterion to the metadata in the metrics catalog to obtain a result that satisfies the search criterion; and causing, by the data intake and query system, the result or data indicative of the result to be displayed on a display device. 2. The method of claim 1, further comprising: calling, by the data intake and query system, an application programming interface (API) to retrieve metrics data from the metrics store, the metrics data being cataloged in the in-memory metrics catalog. 3. The method of claim 1, wherein the plurality of metrics is received by the data intake and query system over a computer network from a plurality of remote computer systems. 4. The method of claim 1, wherein the query is input via a user interface displayed on the display device, and wherein the result or the data indicative of the result is displayed on the user interface. 5. The method of claim 1, wherein the metrics store is not an in-memory metrics store. 6. The method of claim 1, wherein the metrics store resides in non-volatile memory, and wherein the result is obtained by retrieving data only from the metrics catalog. 7. The method of claim 1, wherein the metrics store resides in non-volatile memory, and wherein the result is obtained by retrieving data from the metrics store. 8. The method of claim 1, wherein at least some of the metadata is user-specified metadata. 9. The method of claim 1, wherein the metadata includes user-specified metadata indicative of at least one condition for triggering retrieval of metrics data from the metrics store to the metrics catalog. 10. The method of claim 1, wherein the metadata includes user-specified metadata indicative of a threshold of a measure value, a range of a measure value, or a preferred measure value for a metric. 11. The method of claim 1, wherein the metadata defines a condition related to a metric in the metrics store, and occurrence of the condition triggers display of an alert on the display device. 12. The method of claim 1, wherein the search query is expressed in a pipelined search language. 13. The method of claim 1, further comprising populating an index associated with the plurality of metrics, wherein the index includes a plurality of dimensions, each of the plurality of dimensions is either a required dimension or an optional dimension, each metric includes a value for each required dimension, and not all of the plurality of metrics include values for an optional dimension. 14. The method of claim 1, further comprising populating an index associated with the plurality of metrics, wherein the index includes a plurality of dimensions, and the plurality of dimensions include a user-specified dimension. 15. The method of claim 1, wherein each metric has only one measure value, and the measure value is a floating-point value. 16. The method of claim 1, wherein the plurality of metrics is received by the data intake and query system over a computer network from a plurality of remote computer systems, and each metric is structured data or semi-structured data. 17. The method of claim 1, wherein the measure value is a utilization of a processor, a temperature of an electronic component, or a voltage of an electronic component. 18. The method of claim 1, wherein the search criterion has a scope including metrics data and non-metrics data, and wherein the result includes metrics data and non-metrics data. 19. The method of claim 1, wherein the metadata includes user-specified metadata for use in causing a metric to appear deleted or edited from the metric store. 20. The method of claim 1, wherein the metadata includes user-specified metadata for use in causing a metric to appear with a unit value different from a unit value of the metric in the metric store. 21. The method of claim 1, wherein the metadata includes user-specified metadata indicative of a relationship between two or more metrics in the metrics store. 22. A non-transitory machine-readable storage medium storing instructions, execution of which by a processor in a data intake and query system causes the data intake and query system to perform operations comprising: populating a metrics store with a plurality of metrics, each metric of the plurality of metrics including a measure value; storing metadata in an in-memory metrics catalog, the metadata corresponding to a specified condition associated with a metric of the plurality of metrics; receiving a search query including a search criterion; evaluating the search query by applying the search criterion to the metadata in the metrics catalog to obtain a result that satisfies the search criterion; and causing the result or data indicative of the result to be displayed on a display device. 23. The non-transitory machine-readable storage medium of claim 22, such that the metrics store is not an in-memory metrics store. 24. The non-transitory machine-readable storage medium of claim 22, such that the metrics store resides in non-volatile memory, and the result is obtained by retrieving data only from the metrics catalog. 25. The non-transitory machine-readable storage of claim 22, such that the metrics store resides in non-volatile memory, and wherein the result is obtained by retrieving data from the metrics store. 26. The non-transitory machine-readable storage medium of claim 22, such that at least some of the metadata is user-specified metadata. 27. A data intake and query system comprising: a processor; and memory containing instructions that, when executed by the electronic device, cause the data intake and query system to: populate a metrics store with a plurality of metrics, each metric of the plurality of metrics including a measure value; store metadata in an in-memory metrics catalog, the metadata corresponding to a specified condition associated with a metric of the plurality of metrics; receive a search query including a search criterion; evaluate the search query by applying the search criterion to the metadata in the metrics catalog to obtain a result that satisfies the search criterion; and cause the result or data indicative of the result to be displayed on a display device. 28. The data intake and query system of claim 27, wherein at least some of the metadata is user-specified metadata. 29. The data intake and query system of claim 27, wherein the metadata includes user-specified metadata indicative of at least one condition for triggering retrieval of metrics data from the metrics store to the metrics catalog. 30. The data intake and query system of claim 27, wherein the metadata includes user-specified metadata indicative of a threshold of a measure value, a range of a measure value, or a preferred measure value for a metric.
The disclosed embodiments include a method performed by a data intake and query system. The method includes populating each metric including a measure value, cataloging metadata in an in-memory metrics catalog, where the metadata is related to the metrics. The method further includes receiving a search query including search criteria, evaluating the search query by applying the search criteria to the metadata of the metrics catalog to obtain results that satisfy the search criteria, and causing display, on a display device, of the results or data indicative of the results.1. A method comprising: populating, by a data intake and query system, a metrics store with a plurality of metrics, each metric of the plurality of metrics including a measure value; storing, by the data intake and query system, metadata in an in-memory metrics catalog, the metadata corresponding to a specified condition associated with a metric of the plurality of metrics; receiving, by the data intake and query system, a search query including a search criterion; evaluating, by the data intake and query system, the search query by applying the search criterion to the metadata in the metrics catalog to obtain a result that satisfies the search criterion; and causing, by the data intake and query system, the result or data indicative of the result to be displayed on a display device. 2. The method of claim 1, further comprising: calling, by the data intake and query system, an application programming interface (API) to retrieve metrics data from the metrics store, the metrics data being cataloged in the in-memory metrics catalog. 3. The method of claim 1, wherein the plurality of metrics is received by the data intake and query system over a computer network from a plurality of remote computer systems. 4. The method of claim 1, wherein the query is input via a user interface displayed on the display device, and wherein the result or the data indicative of the result is displayed on the user interface. 5. The method of claim 1, wherein the metrics store is not an in-memory metrics store. 6. The method of claim 1, wherein the metrics store resides in non-volatile memory, and wherein the result is obtained by retrieving data only from the metrics catalog. 7. The method of claim 1, wherein the metrics store resides in non-volatile memory, and wherein the result is obtained by retrieving data from the metrics store. 8. The method of claim 1, wherein at least some of the metadata is user-specified metadata. 9. The method of claim 1, wherein the metadata includes user-specified metadata indicative of at least one condition for triggering retrieval of metrics data from the metrics store to the metrics catalog. 10. The method of claim 1, wherein the metadata includes user-specified metadata indicative of a threshold of a measure value, a range of a measure value, or a preferred measure value for a metric. 11. The method of claim 1, wherein the metadata defines a condition related to a metric in the metrics store, and occurrence of the condition triggers display of an alert on the display device. 12. The method of claim 1, wherein the search query is expressed in a pipelined search language. 13. The method of claim 1, further comprising populating an index associated with the plurality of metrics, wherein the index includes a plurality of dimensions, each of the plurality of dimensions is either a required dimension or an optional dimension, each metric includes a value for each required dimension, and not all of the plurality of metrics include values for an optional dimension. 14. The method of claim 1, further comprising populating an index associated with the plurality of metrics, wherein the index includes a plurality of dimensions, and the plurality of dimensions include a user-specified dimension. 15. The method of claim 1, wherein each metric has only one measure value, and the measure value is a floating-point value. 16. The method of claim 1, wherein the plurality of metrics is received by the data intake and query system over a computer network from a plurality of remote computer systems, and each metric is structured data or semi-structured data. 17. The method of claim 1, wherein the measure value is a utilization of a processor, a temperature of an electronic component, or a voltage of an electronic component. 18. The method of claim 1, wherein the search criterion has a scope including metrics data and non-metrics data, and wherein the result includes metrics data and non-metrics data. 19. The method of claim 1, wherein the metadata includes user-specified metadata for use in causing a metric to appear deleted or edited from the metric store. 20. The method of claim 1, wherein the metadata includes user-specified metadata for use in causing a metric to appear with a unit value different from a unit value of the metric in the metric store. 21. The method of claim 1, wherein the metadata includes user-specified metadata indicative of a relationship between two or more metrics in the metrics store. 22. A non-transitory machine-readable storage medium storing instructions, execution of which by a processor in a data intake and query system causes the data intake and query system to perform operations comprising: populating a metrics store with a plurality of metrics, each metric of the plurality of metrics including a measure value; storing metadata in an in-memory metrics catalog, the metadata corresponding to a specified condition associated with a metric of the plurality of metrics; receiving a search query including a search criterion; evaluating the search query by applying the search criterion to the metadata in the metrics catalog to obtain a result that satisfies the search criterion; and causing the result or data indicative of the result to be displayed on a display device. 23. The non-transitory machine-readable storage medium of claim 22, such that the metrics store is not an in-memory metrics store. 24. The non-transitory machine-readable storage medium of claim 22, such that the metrics store resides in non-volatile memory, and the result is obtained by retrieving data only from the metrics catalog. 25. The non-transitory machine-readable storage of claim 22, such that the metrics store resides in non-volatile memory, and wherein the result is obtained by retrieving data from the metrics store. 26. The non-transitory machine-readable storage medium of claim 22, such that at least some of the metadata is user-specified metadata. 27. A data intake and query system comprising: a processor; and memory containing instructions that, when executed by the electronic device, cause the data intake and query system to: populate a metrics store with a plurality of metrics, each metric of the plurality of metrics including a measure value; store metadata in an in-memory metrics catalog, the metadata corresponding to a specified condition associated with a metric of the plurality of metrics; receive a search query including a search criterion; evaluate the search query by applying the search criterion to the metadata in the metrics catalog to obtain a result that satisfies the search criterion; and cause the result or data indicative of the result to be displayed on a display device. 28. The data intake and query system of claim 27, wherein at least some of the metadata is user-specified metadata. 29. The data intake and query system of claim 27, wherein the metadata includes user-specified metadata indicative of at least one condition for triggering retrieval of metrics data from the metrics store to the metrics catalog. 30. The data intake and query system of claim 27, wherein the metadata includes user-specified metadata indicative of a threshold of a measure value, a range of a measure value, or a preferred measure value for a metric.
1,600
344,468
16,803,970
3,642
Disclosed is a livestock tag strap comprising an animal-safe element, a human-safe element or both.
1. A livestock tag strap comprising a body element and an animal-safe element, a human-safe element or both an animal-safe element and a human-safe element, wherein the animal-safe element, the human-safe element, or both the animal-safe element and human-safe element, have a lower tensile strength than the body element. 2. The livestock tag strap according to claim 1, wherein the animal-safe element comprises a segment or region that withstands, or is able to withstand, a force of up to about 750 Newtons. 3. The livestock tag strap according to claim 1, wherein the animal-safe element comprises a segment or region that withstands, or is able to withstand, a force of up to about 750 Newtons, wherein when a force higher than about 750 Newtons is exerted on the strap, the segment or region in the animal safe segment changes shape. 4. The livestock tag strap according to claim 3, wherein the change of shape includes stretching, tearing, breaking, and any combination thereof. 4. The livestock tag strap according to claim 1, wherein the animal-safe element comprises a segment or region that has a tensile strength between about 500 and about 750. 5. The livestock tag strap according to claim 1, wherein the human-safe element has a shape size and texture that allows human handling without harm to the human. 6. The livestock tag strap according to claim 1, wherein the livestock tag strap is prepared from one type of polymer or polymer blend. 7. The livestock tag strap according to claim 1, wherein the livestock tag strap is prepared from two or more types of polymers or polymer blends. 8. The livestock tag strap according to claim 1, wherein the animal-safe element is prepared from the same polymer(s) and/or polymer blend(s) as the body element. 9. The livestock tag strap according to claim 1, wherein the animal-safe element is prepared from different polymer(s) and/or polymer blend(s) as the body element. 10. The livestock tag strap according to claim 9, wherein the animal-safe element is prepared from a polymer(s) and/or polymer blend(s) that has a lower tensile strength than the body element. 11. The livestock tag strap according to claim 1, wherein the human-safe element is prepared from different polymer(s) and/or polymer blend(s) as the body element. 12. The livestock tag strap according to claim 11, wherein the human-safe element is prepared from a polymer(s) and/or polymer blend(s) that has a lower tensile strength than the body element. 13. The livestock tag strap according to claim 1, which is a leg strap. 14. The livestock tag strap according to claim 1, wherein the human safe element comprises a tab that has a flat configuration and a rounded-folded configuration. 15. The livestock tag strap according to claim 14, wherein the tab is transformed from the flat configuration to the rounded-folded configuration when the livestock tag strap is applied to the livestock. 16. The livestock tag strap according to claim 1, wherein the animal-safe element includes a locking element, which allows the strap to be fastened, though not unfastened without being broken or torn. 17. A system comprising the livestock tag strap according to claim 1 and a spacer. 18. A kit comprising the livestock tag strap according to claim 1 and a spacer.
Disclosed is a livestock tag strap comprising an animal-safe element, a human-safe element or both.1. A livestock tag strap comprising a body element and an animal-safe element, a human-safe element or both an animal-safe element and a human-safe element, wherein the animal-safe element, the human-safe element, or both the animal-safe element and human-safe element, have a lower tensile strength than the body element. 2. The livestock tag strap according to claim 1, wherein the animal-safe element comprises a segment or region that withstands, or is able to withstand, a force of up to about 750 Newtons. 3. The livestock tag strap according to claim 1, wherein the animal-safe element comprises a segment or region that withstands, or is able to withstand, a force of up to about 750 Newtons, wherein when a force higher than about 750 Newtons is exerted on the strap, the segment or region in the animal safe segment changes shape. 4. The livestock tag strap according to claim 3, wherein the change of shape includes stretching, tearing, breaking, and any combination thereof. 4. The livestock tag strap according to claim 1, wherein the animal-safe element comprises a segment or region that has a tensile strength between about 500 and about 750. 5. The livestock tag strap according to claim 1, wherein the human-safe element has a shape size and texture that allows human handling without harm to the human. 6. The livestock tag strap according to claim 1, wherein the livestock tag strap is prepared from one type of polymer or polymer blend. 7. The livestock tag strap according to claim 1, wherein the livestock tag strap is prepared from two or more types of polymers or polymer blends. 8. The livestock tag strap according to claim 1, wherein the animal-safe element is prepared from the same polymer(s) and/or polymer blend(s) as the body element. 9. The livestock tag strap according to claim 1, wherein the animal-safe element is prepared from different polymer(s) and/or polymer blend(s) as the body element. 10. The livestock tag strap according to claim 9, wherein the animal-safe element is prepared from a polymer(s) and/or polymer blend(s) that has a lower tensile strength than the body element. 11. The livestock tag strap according to claim 1, wherein the human-safe element is prepared from different polymer(s) and/or polymer blend(s) as the body element. 12. The livestock tag strap according to claim 11, wherein the human-safe element is prepared from a polymer(s) and/or polymer blend(s) that has a lower tensile strength than the body element. 13. The livestock tag strap according to claim 1, which is a leg strap. 14. The livestock tag strap according to claim 1, wherein the human safe element comprises a tab that has a flat configuration and a rounded-folded configuration. 15. The livestock tag strap according to claim 14, wherein the tab is transformed from the flat configuration to the rounded-folded configuration when the livestock tag strap is applied to the livestock. 16. The livestock tag strap according to claim 1, wherein the animal-safe element includes a locking element, which allows the strap to be fastened, though not unfastened without being broken or torn. 17. A system comprising the livestock tag strap according to claim 1 and a spacer. 18. A kit comprising the livestock tag strap according to claim 1 and a spacer.
3,600
344,469
16,803,940
3,642
There are provided systems and methods for a server-driven user interface presentation framework for device applications. A service provider server, such as an electronic transaction processor for device applications, may provide a framework where application developers and other software providers may develop user interfaces for their device-side application that may be hosted and driven to the application on a device by the service provider's server. The framework may include operations for selecting, arranging, and designing frames of a user interface, which may then be composed into a flow that allows navigation between the different frame, for example, to input data or view different information. Once created, a device side software development kit may be implemented with the application, which may be used to fetch data for, and then display, the user interface through the application.
1. A system comprising: a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising: receiving a navigation to an interface of an application executing on the system; determining an interface flow between a plurality of frames of the interface, wherein the interface flow comprises a plurality of sub-flows based on different user inputs in a first frame of the plurality of frames and one or more policies associated with the different user inputs; determining the first frame of the plurality of frames to display based in the navigation and the interface flow, wherein the first frame comprises a layout of at least one interface component and interface data to display within the at least one interface component, and wherein the at least one interface component comprises an interface field; determining that the interface data comprises a data object for dynamic data from an external resource; determining the dynamic data from the external resource at a time of the navigation to the interface of the application; loading the first frame of the interface into the application based on the interface data, wherein the loading of the first frame causes the interface data to be displayed within the at least one interface component in the interface of the application, and wherein the data object enables a display of the dynamic data within the first frame based on the external resource; receiving a first user input to the application via the interface field in the first frame of the interface; determining a first sub-flow of the plurality of sub-flows based on the first user input and the one or more policies; and changing the interface flow based on the first sub-flow. 2. The system of claim 1, wherein prior to the determining the interface flow, the operations further comprise: requesting data for the interface flow from a server of a service provider, wherein the data is associated with the application and a software development kit (SDK) for retrieval and display of the interface within the application based on the data; and receiving the data from the server. 3. The system of claim 1, wherein the operations further comprise: receiving a further navigation to a second frame of the plurality of frames; and advancing the interface to the second frame based on the further navigation and the changed interface flow. 4. The system of claim 3, wherein the further navigation comprises at least one of a second user input to the at least one interface component or an activation of one interface component from the at least one interface component. 5. The system of claim 1, wherein the plurality of frames and the interface flow for the interface are generated by a server and received by the system on behalf of an entity providing the application to the system. 6. The system of claim 1, wherein the operations further comprise: receiving the one or more policies to display the interface data; and determining one of the one or more policies based on a parameter of the system. 7. The system of claim 6, wherein the parameter of the system comprises one of a location of the system, a type of the application on the system, or a domain associated with the at least one interface component. 8. The system of claim 1, wherein the at least one interface component is based on a registry of interface components for a device type of the system. 9. The system of claim 1, wherein the at least one interface component comprises a process for a service provider associated with the interface within the application, and wherein the process comprises one of an account registration process, an electronic transaction processing process, or an account login process. 10. The system of claim 9, wherein the process is linked to a data processing operation with a server of the service provider. 11. A method comprising: receiving a request to generate an interface for an application; providing a registry of interface components for the interface; receiving a first layout of a first frame of the interface that comprises at least one first interface component from the registry of the interface components, wherein the first layout comprises a first structure of the interface for the first frame, and wherein the at least one first interface component comprises an interface field; generating the first frame based on the first layout; receiving a flow to a second frame of the interface, wherein the flow navigates from the first frame to the second frame, and wherein the flow comprises a plurality of sub-flows based on different user inputs in the first frame and one or more policies associated with the different user inputs; determining that the interface comprises a data object for dynamic data from an external resource; determining the dynamic data from the external resource at a time of the request to generate the interface of the application; receiving a first selection of a user input from the different user inputs for the interface field in the first frame of the interface; receiving a second selection of a sub-flow of the plurality of sub-flows based on the user input and the one or more policies; and generating the interface based on the first frame, the flow, the sub-flow, the second frame, and the dynamic data. 12. The method of claim 11, wherein the at least one first interface component is displayed within a container for the first frame based on the first structure. 13. The method of claim 11, wherein prior to the generating the interface, the method further comprises: receiving a second layout of the second frame of the interface that comprises at least one second interface component from the registry of the interface components; and generating the second frame based on the second layout. 14. The method of claim 11, wherein the at least one first interface component comprises a process for the application that is executable through the interface, and wherein the process comprises the interface field for entry of the user input to an operation of a service provider associated with the interface. 15. The method of claim 11, wherein prior to receiving the request to generate the interface, the method further comprises: providing a software development kit (SDK) to an entity associated with the application, wherein the SDK provides functionality of a service provider within the application. 16. The method of claim 15, wherein the SDK is further associated with a component library for the application that provides the at least one first interface component on a device displaying the interface. 17. The method of claim 11, wherein the interface is generated by service provider server, and wherein the method further comprises: loading interface data for the interface to a device having the application that utilizes the interface. 18. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising: receiving, by a computing device, interface data for an interface of an application on the computing device from a server of a service provider, wherein the interface data comprises a flow between a plurality of frames of the interface that is displayable using a software development kit (SDK) on the computing device for the application, and wherein the flow comprises a plurality of sub-flows based on different user inputs in at least one of the plurality of frames and one or more policies associated with the different user inputs; receiving a request to display the interface data during a use of the application; determining that the interface data comprises a data object for dynamic data from an external resource; determining the dynamic data from the external resource at a time of a navigation to the interface of the application; rendering the interface data within the application using the SDK and the dynamic data, wherein the interface data comprises an interface field within the application; receiving a user input to the application via the interface field; determining a sub-flow of the plurality of sub-flows based on the user input and the one or more policies; and changing the flow based on the sub-flow. 19. The non-transitory machine-readable medium of claim 18, wherein the interface comprises a payment interface having a plurality of components associated with the service provider, and wherein each of the plurality of components display, within the interface of the application, one of displayable data or a service provider process associated with at least one of the application or the service provider. 20. The non-transitory machine-readable medium of claim 19, wherein the interface data is received from the server of the service provider, and wherein the interface data further comprises a plurality of policies associated with display of data within the plurality of components based on a parameter of the computing device.
There are provided systems and methods for a server-driven user interface presentation framework for device applications. A service provider server, such as an electronic transaction processor for device applications, may provide a framework where application developers and other software providers may develop user interfaces for their device-side application that may be hosted and driven to the application on a device by the service provider's server. The framework may include operations for selecting, arranging, and designing frames of a user interface, which may then be composed into a flow that allows navigation between the different frame, for example, to input data or view different information. Once created, a device side software development kit may be implemented with the application, which may be used to fetch data for, and then display, the user interface through the application.1. A system comprising: a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising: receiving a navigation to an interface of an application executing on the system; determining an interface flow between a plurality of frames of the interface, wherein the interface flow comprises a plurality of sub-flows based on different user inputs in a first frame of the plurality of frames and one or more policies associated with the different user inputs; determining the first frame of the plurality of frames to display based in the navigation and the interface flow, wherein the first frame comprises a layout of at least one interface component and interface data to display within the at least one interface component, and wherein the at least one interface component comprises an interface field; determining that the interface data comprises a data object for dynamic data from an external resource; determining the dynamic data from the external resource at a time of the navigation to the interface of the application; loading the first frame of the interface into the application based on the interface data, wherein the loading of the first frame causes the interface data to be displayed within the at least one interface component in the interface of the application, and wherein the data object enables a display of the dynamic data within the first frame based on the external resource; receiving a first user input to the application via the interface field in the first frame of the interface; determining a first sub-flow of the plurality of sub-flows based on the first user input and the one or more policies; and changing the interface flow based on the first sub-flow. 2. The system of claim 1, wherein prior to the determining the interface flow, the operations further comprise: requesting data for the interface flow from a server of a service provider, wherein the data is associated with the application and a software development kit (SDK) for retrieval and display of the interface within the application based on the data; and receiving the data from the server. 3. The system of claim 1, wherein the operations further comprise: receiving a further navigation to a second frame of the plurality of frames; and advancing the interface to the second frame based on the further navigation and the changed interface flow. 4. The system of claim 3, wherein the further navigation comprises at least one of a second user input to the at least one interface component or an activation of one interface component from the at least one interface component. 5. The system of claim 1, wherein the plurality of frames and the interface flow for the interface are generated by a server and received by the system on behalf of an entity providing the application to the system. 6. The system of claim 1, wherein the operations further comprise: receiving the one or more policies to display the interface data; and determining one of the one or more policies based on a parameter of the system. 7. The system of claim 6, wherein the parameter of the system comprises one of a location of the system, a type of the application on the system, or a domain associated with the at least one interface component. 8. The system of claim 1, wherein the at least one interface component is based on a registry of interface components for a device type of the system. 9. The system of claim 1, wherein the at least one interface component comprises a process for a service provider associated with the interface within the application, and wherein the process comprises one of an account registration process, an electronic transaction processing process, or an account login process. 10. The system of claim 9, wherein the process is linked to a data processing operation with a server of the service provider. 11. A method comprising: receiving a request to generate an interface for an application; providing a registry of interface components for the interface; receiving a first layout of a first frame of the interface that comprises at least one first interface component from the registry of the interface components, wherein the first layout comprises a first structure of the interface for the first frame, and wherein the at least one first interface component comprises an interface field; generating the first frame based on the first layout; receiving a flow to a second frame of the interface, wherein the flow navigates from the first frame to the second frame, and wherein the flow comprises a plurality of sub-flows based on different user inputs in the first frame and one or more policies associated with the different user inputs; determining that the interface comprises a data object for dynamic data from an external resource; determining the dynamic data from the external resource at a time of the request to generate the interface of the application; receiving a first selection of a user input from the different user inputs for the interface field in the first frame of the interface; receiving a second selection of a sub-flow of the plurality of sub-flows based on the user input and the one or more policies; and generating the interface based on the first frame, the flow, the sub-flow, the second frame, and the dynamic data. 12. The method of claim 11, wherein the at least one first interface component is displayed within a container for the first frame based on the first structure. 13. The method of claim 11, wherein prior to the generating the interface, the method further comprises: receiving a second layout of the second frame of the interface that comprises at least one second interface component from the registry of the interface components; and generating the second frame based on the second layout. 14. The method of claim 11, wherein the at least one first interface component comprises a process for the application that is executable through the interface, and wherein the process comprises the interface field for entry of the user input to an operation of a service provider associated with the interface. 15. The method of claim 11, wherein prior to receiving the request to generate the interface, the method further comprises: providing a software development kit (SDK) to an entity associated with the application, wherein the SDK provides functionality of a service provider within the application. 16. The method of claim 15, wherein the SDK is further associated with a component library for the application that provides the at least one first interface component on a device displaying the interface. 17. The method of claim 11, wherein the interface is generated by service provider server, and wherein the method further comprises: loading interface data for the interface to a device having the application that utilizes the interface. 18. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising: receiving, by a computing device, interface data for an interface of an application on the computing device from a server of a service provider, wherein the interface data comprises a flow between a plurality of frames of the interface that is displayable using a software development kit (SDK) on the computing device for the application, and wherein the flow comprises a plurality of sub-flows based on different user inputs in at least one of the plurality of frames and one or more policies associated with the different user inputs; receiving a request to display the interface data during a use of the application; determining that the interface data comprises a data object for dynamic data from an external resource; determining the dynamic data from the external resource at a time of a navigation to the interface of the application; rendering the interface data within the application using the SDK and the dynamic data, wherein the interface data comprises an interface field within the application; receiving a user input to the application via the interface field; determining a sub-flow of the plurality of sub-flows based on the user input and the one or more policies; and changing the flow based on the sub-flow. 19. The non-transitory machine-readable medium of claim 18, wherein the interface comprises a payment interface having a plurality of components associated with the service provider, and wherein each of the plurality of components display, within the interface of the application, one of displayable data or a service provider process associated with at least one of the application or the service provider. 20. The non-transitory machine-readable medium of claim 19, wherein the interface data is received from the server of the service provider, and wherein the interface data further comprises a plurality of policies associated with display of data within the plurality of components based on a parameter of the computing device.
3,600
344,470
16,803,969
3,642
A plasma generating system includes a waveguide for transmitting a microwave energy therethrough and an inner wall disposed within the waveguide to define a plasma cavity, where a plasma is generated within the plasma cavity using the microwave energy. The plasma generating system further includes: an adaptor mounted on a first side of the waveguide and physically separated from the waveguide by a first gap and having a gas outlet through which a gas processed by the plasma exits the plasma cavity; and an EM seal disposed in the first gap and configured to block leakage of the microwave energy through the first gap.
1. A plasma generating system, comprising: a waveguide for transmitting a microwave energy therethrough; an inner wall disposed within the waveguide to define a plasma cavity, a plasma being generated within the plasma cavity using the microwave energy; an adaptor mounted on a first side of the waveguide and physically separated from the waveguide by a first gap and having a gas outlet through which a gas processed by the plasma exits the plasma cavity; and a first electromagnetic (EM) seal disposed in the first gap and configured to block leakage of the microwave energy through the first gap. 2. A plasma generating system as recited in claim 1, wherein the first electromagnetic (EM) seal is a washer 3. A plasma generating system as recited in claim 1, wherein the first electromagnetic (EM) seal is a coil spring. 4. A plasma generating system as recited in claim 1, wherein the adaptor includes: an adaptor body having the gas outlet; a seal container detachably secured to the adaptor body and having a notch, the inner wall being disposed between the adaptor body and the seal container; and a gas seal disposed in the notch and configured to block a leakage of gas through a second gap between the adaptor body and the inner wall. 5. A plasma generating system as recited in claim 4, wherein the gas seal is formed of a graphite. 6. A plasma generating system as recited in claim 4, further comprising; a coating formed on a portion of the inner wall and made of a material that blocks microwave energy and configured to prevent microwave energy from reaching the gas seal. 7. A plasma generating system as recited in claim 4, further comprising; a second electromagnetic (EM) seal disposed in the second gap and configured to prevent microwave energy from reaching the gas seal. 8. A plasma generating system as recited in claim 7, wherein the second electromagnetic (EM) seal is a coil spring. 9. A plasma generating system as recited in claim 4, further comprising; a metal sheet disposed in the second gap and configured to prevent microwave energy from reaching the gas seal. 10. A plasma generating system as recited in claim 4, wherein the adaptor body includes a hole for receiving an input gas from outside of the adaptor and is configured to generate a vortex flow within the plasma cavity using the first gas, 11. A plasma generating system as recited in claim 10, wherein the adaptor body has one or more passageways through which the input gas is introduced into the plasma cavity and each of the one or more passageways is arranged to impart a vortical motion to the input gas that passes therethrough. 12. A plasma generating system as recited in claim 1, further comprising: a flow inlet mounted on a second side of the waveguide and configured to introduce an input gas into the plasma cavity and generate a vortex flow within the plasma cavity using the input gas, the flow inlet being physically separated from the waveguide by a third gap. 13. A plasma generating system as recited in claim 12, further comprising: a third electromagnetic (EM) seal mounted in the third gap and configured to block leakage of microwave energy through the third gap. 14. A plasma generating system as recited in claim 13, wherein the third electromagnetic (EM) seal is a washer. 15. A plasma generating system as recited in claim 14, wherein the washer is formed of an electrically conducting material. 16. A plasma generating system as recited in claim 13, wherein the third electromagnetic (EM) seal is a coil spring. 17. A plasma generating system as recited in claim 12, wherein the flow inlet includes: a flow inlet body having a hole for receiving the input gas from outside of the flow inlet; a lid detachably secured to the flow inlet body and defining an enclosed chamber that is in fluid communication with the hole in the flow inlet body; and a vortex generator mounted on the flow inlet body and having a hole that is in fluid communication with the chamber and configured to generate the vortex flow within the plasma cavity using the input gas. 18. A plasma generating system as recited in claim 17, wherein the vortex generator includes one or more passageways through which the input gas flows and each of the one or more passageways is arranged to impart a vortical motion to the input gas that passes therethrough. 19. A plasma generating system as recited in claim 17, further comprising: a gas seal disposed in a fourth gap between the inner wall and the flow inlet body and configured to seal leakage of gas through the fourth gap. 20. A plasma generating system as recited in claim 19, wherein the gas seal is formed of elastomeric material. 21. A plasma generating system as recited in claim 19, wherein the gas seal is formed of a graphite. 22. A plasma generating system as recited in claim 19, further comprising; a coating formed on a portion of the inner wall and made of a material that blocks microwave energy and configured to prevent microwave energy from reaching the gas seal. 23. A plasma generating system as recited in claim 17, further comprising: a seal container detachably secured to the flow inlet body and having a notch, the inner wall being disposed between the flow inlet body and the seal container; and a gas seal disposed in the notch and configured to block a leakage of gas through a fourth gap between the flow inlet body and the inner wall. 24. A plasma generating system as recited in claim 23, wherein the gas seal is formed of a graphite. 25. A plasma generating system as recited in claim 23, further comprising; a coating formed on a portion of the inner wall and made of a material that blocks microwave energy and configured to prevent microwave energy from reaching the gas seal. 26. A plasma generating system as recited in claim 23, further comprising; a second electromagnetic (EM) seal disposed in the fourth gap and configured to prevent microwave energy from reaching the gas seal. 27. A plasma generating system as recited in claim 26, wherein the second electromagnetic (EM) seal is a coil spring. 28. A plasma generating system as recited in claim 23, further comprising; a metal sheet disposed in the fourth gap and configured to prevent microwave energy from reaching the gas seal.
A plasma generating system includes a waveguide for transmitting a microwave energy therethrough and an inner wall disposed within the waveguide to define a plasma cavity, where a plasma is generated within the plasma cavity using the microwave energy. The plasma generating system further includes: an adaptor mounted on a first side of the waveguide and physically separated from the waveguide by a first gap and having a gas outlet through which a gas processed by the plasma exits the plasma cavity; and an EM seal disposed in the first gap and configured to block leakage of the microwave energy through the first gap.1. A plasma generating system, comprising: a waveguide for transmitting a microwave energy therethrough; an inner wall disposed within the waveguide to define a plasma cavity, a plasma being generated within the plasma cavity using the microwave energy; an adaptor mounted on a first side of the waveguide and physically separated from the waveguide by a first gap and having a gas outlet through which a gas processed by the plasma exits the plasma cavity; and a first electromagnetic (EM) seal disposed in the first gap and configured to block leakage of the microwave energy through the first gap. 2. A plasma generating system as recited in claim 1, wherein the first electromagnetic (EM) seal is a washer 3. A plasma generating system as recited in claim 1, wherein the first electromagnetic (EM) seal is a coil spring. 4. A plasma generating system as recited in claim 1, wherein the adaptor includes: an adaptor body having the gas outlet; a seal container detachably secured to the adaptor body and having a notch, the inner wall being disposed between the adaptor body and the seal container; and a gas seal disposed in the notch and configured to block a leakage of gas through a second gap between the adaptor body and the inner wall. 5. A plasma generating system as recited in claim 4, wherein the gas seal is formed of a graphite. 6. A plasma generating system as recited in claim 4, further comprising; a coating formed on a portion of the inner wall and made of a material that blocks microwave energy and configured to prevent microwave energy from reaching the gas seal. 7. A plasma generating system as recited in claim 4, further comprising; a second electromagnetic (EM) seal disposed in the second gap and configured to prevent microwave energy from reaching the gas seal. 8. A plasma generating system as recited in claim 7, wherein the second electromagnetic (EM) seal is a coil spring. 9. A plasma generating system as recited in claim 4, further comprising; a metal sheet disposed in the second gap and configured to prevent microwave energy from reaching the gas seal. 10. A plasma generating system as recited in claim 4, wherein the adaptor body includes a hole for receiving an input gas from outside of the adaptor and is configured to generate a vortex flow within the plasma cavity using the first gas, 11. A plasma generating system as recited in claim 10, wherein the adaptor body has one or more passageways through which the input gas is introduced into the plasma cavity and each of the one or more passageways is arranged to impart a vortical motion to the input gas that passes therethrough. 12. A plasma generating system as recited in claim 1, further comprising: a flow inlet mounted on a second side of the waveguide and configured to introduce an input gas into the plasma cavity and generate a vortex flow within the plasma cavity using the input gas, the flow inlet being physically separated from the waveguide by a third gap. 13. A plasma generating system as recited in claim 12, further comprising: a third electromagnetic (EM) seal mounted in the third gap and configured to block leakage of microwave energy through the third gap. 14. A plasma generating system as recited in claim 13, wherein the third electromagnetic (EM) seal is a washer. 15. A plasma generating system as recited in claim 14, wherein the washer is formed of an electrically conducting material. 16. A plasma generating system as recited in claim 13, wherein the third electromagnetic (EM) seal is a coil spring. 17. A plasma generating system as recited in claim 12, wherein the flow inlet includes: a flow inlet body having a hole for receiving the input gas from outside of the flow inlet; a lid detachably secured to the flow inlet body and defining an enclosed chamber that is in fluid communication with the hole in the flow inlet body; and a vortex generator mounted on the flow inlet body and having a hole that is in fluid communication with the chamber and configured to generate the vortex flow within the plasma cavity using the input gas. 18. A plasma generating system as recited in claim 17, wherein the vortex generator includes one or more passageways through which the input gas flows and each of the one or more passageways is arranged to impart a vortical motion to the input gas that passes therethrough. 19. A plasma generating system as recited in claim 17, further comprising: a gas seal disposed in a fourth gap between the inner wall and the flow inlet body and configured to seal leakage of gas through the fourth gap. 20. A plasma generating system as recited in claim 19, wherein the gas seal is formed of elastomeric material. 21. A plasma generating system as recited in claim 19, wherein the gas seal is formed of a graphite. 22. A plasma generating system as recited in claim 19, further comprising; a coating formed on a portion of the inner wall and made of a material that blocks microwave energy and configured to prevent microwave energy from reaching the gas seal. 23. A plasma generating system as recited in claim 17, further comprising: a seal container detachably secured to the flow inlet body and having a notch, the inner wall being disposed between the flow inlet body and the seal container; and a gas seal disposed in the notch and configured to block a leakage of gas through a fourth gap between the flow inlet body and the inner wall. 24. A plasma generating system as recited in claim 23, wherein the gas seal is formed of a graphite. 25. A plasma generating system as recited in claim 23, further comprising; a coating formed on a portion of the inner wall and made of a material that blocks microwave energy and configured to prevent microwave energy from reaching the gas seal. 26. A plasma generating system as recited in claim 23, further comprising; a second electromagnetic (EM) seal disposed in the fourth gap and configured to prevent microwave energy from reaching the gas seal. 27. A plasma generating system as recited in claim 26, wherein the second electromagnetic (EM) seal is a coil spring. 28. A plasma generating system as recited in claim 23, further comprising; a metal sheet disposed in the fourth gap and configured to prevent microwave energy from reaching the gas seal.
3,600
344,471
16,803,964
3,642
In writing and reading data at a semiconductor storage device, control is carried out such that, at a time of a burst mode, in a case in which a value of a block address which is, from addresses assigned to a region of an internal address, an address for selecting a sense amplifier block from plural sense amplifier blocks, is a largest value, a first sense amplifier block and a second sense amplifier block are made to access different banks, and, in case in which the value of the block address is not the largest value, the first sense amplifier block and the second sense amplifier block are made to access a same bank of plural banks.
1. A semiconductor storage device that has a plurality of banks, which include a plurality of word lines, and a plurality of sense amplifier blocks, which are shared between the plurality of banks respectively, and that, at a time of a burst mode, causes the plurality of sense amplifier blocks respectively, which are operated simultaneously with respect to the plurality of banks, to access any of the plurality of banks, the device comprising: a selecting section that, at the time of the burst mode, selects, from the plurality of sense amplifier blocks, a first sense amplifier block and a second sense amplifier block that are to be operated simultaneously, on the basis of, from addresses that are assigned to a region of an input internal address, a block address that is an address for selecting any of the sense amplifier blocks from the plurality of sense amplifier blocks, and a bank address that is an address for selecting any of the plurality of banks; a judging section that judges whether or not a value of the block address is a largest value; and a control section that carries out control so as to, in a case in which the value of the block address is the largest value, cause the first sense amplifier block and the second sense amplifier block to access different banks, and, in a case in which the value of the block address is not the largest value, cause the first sense amplifier block and the second sense amplifier block to access a same bank. 2. The semiconductor storage device of claim 1, further comprising: a word line selecting section that selects a word line for the same bank or for each of the respectively different banks that are accessed by the first sense amplifier block and the second sense amplifier block, on the basis of, from addresses assigned to a region of the internal address, a row address that includes the bank address and is an address for selecting any word line from the plurality of word lines, wherein a least significant bit of a bank address, which is, from addresses assigned to a region of the internal address, an address for selecting any of the plurality of banks, is assigned to a region of the internal address so as to become a bit that is one more significant than a most significant bit of the block address, and a least significant bit of the row address is the least significant bit of the bank address. 3. The semiconductor storage device of claim 2, further comprising: a bit line selecting section that, in a case in which a value of the block address is a largest value, judges whether or not the bank address is a largest value, and, in a case in which the bank address is not the largest value, selects a bit line indicated by a column address that is, from addresses assigned to a region of the internal address, an address for selecting a column, and, in a case in which the bank address is the largest value, selects a bit line that is different from the bit line indicated by the column address, wherein a least significant bit of the column address is assigned to a region of the internal address so as to become a bit that is one more significant than a most significant bit of the bank address. 4. A semiconductor storage device that has a plurality of banks, which include a plurality of word lines, and a plurality of sense amplifier blocks, which are shared between the plurality of banks respectively, and that, at a time of a burst mode, causes a plurality of sense amplifier blocks respectively, which are operated simultaneously with respect to the plurality of banks, to access any of the plurality of banks, the device comprising: a selecting section that, at the time of the burst mode, selects, from the plurality of sense amplifier blocks, a first sense amplifier block and a second sense amplifier block that are to be operated simultaneously, on the basis of, from addresses that are assigned to a region of an input internal address, a block address that is an address for selecting any of the sense amplifier blocks from the plurality of sense amplifier blocks, and a bank address that is an address for selecting any of the plurality of banks, and a redundant Y-block control signal that is for selecting a redundant memory array included in the plurality of banks respectively; a judging section that judges whether or not a value of the block address is a largest value; a control section that carries out control so as to, in a case in which the value of the block address is the largest value, cause the first sense amplifier block and the second sense amplifier block to access different banks, and, in a case in which the value of the block address is not the largest value, cause the first sense amplifier block and the second sense amplifier block to access the same bank; and a redundancy control section that, in a case in which the first sense amplifier block and the second sense amplifier block are made to access different banks of the first and second sense amplifier blocks, causes the redundant memory array to access a different sense amplifier block. 5. The semiconductor storage device of claim 4, further comprising: a word line selecting section that selects a word line for the same bank or for each of the respectively different banks that are accessed by the first sense amplifier block and the second sense amplifier block, on the basis of, from addresses assigned to a region of the internal address, a row address that includes the bank address and is an address for selecting any word line from the plurality of word lines, wherein a least significant bit of a bank address, which is, from addresses assigned to a region of the internal address, an address for selecting any of the plurality of banks, is assigned to a region of the internal address so as to become a bit that is one more significant than a most significant bit of the block address, and a least significant bit of the row address is the least significant bit of the bank address. 6. The semiconductor storage device of claim 5, further comprising: a bit line selecting section that, in a case in which a value of the block address is a largest value, judges whether or not the bank address is a largest value, and, in a case in which the bank address is not the largest value, selects a bit line indicated by a column address that is, from addresses assigned to a region of the internal address, an address for selecting a column, and, in a case in which the bank address is the largest value, for one of a column selector having a smallest address and a redundant column selector belonging to a less significant bank, selects a bit line that is different than the bit line indicated by the column address, and, for another of the column selectors, selects the bit line indicated by the column address, wherein a least significant bit of the column address is assigned to a region of the internal address so as to become a bit that is one more significant than a most significant bit of the bank address. 7. The semiconductor storage device of claim 3, further comprising: an incrementing circuit that, in a case in which the bank address is the largest value, judges whether or not the column address is a largest value, and, in a case in which it is judged whether or not the column address is the largest value and the bank address is not a largest value, selects a row address except for the bank address as a row address to be input to a decoder, and, in a case in which the column address is the largest value, selects an address, which is obtained by incrementing by one the row address except for the bank address, as a row address to be input to the decoder. 8. The semiconductor storage device of claim 1, further comprising: a switching section that switches whether or not the burst mode is to be executed, on the basis of a burst mode signal that is an input signal expressing whether or not the burst mode is to be executed. 9. The semiconductor storage device of claim 6, further comprising: an incrementing circuit that, in a case in which the bank address is the largest value, judges whether or not the column address is a largest value, and, in a case in which it is judged whether or not the column address is the largest value and the bank address is not a largest value, selects a row address except for the bank address as a row address to be input to a decoder, and, in a case in which the column address is the largest value, selects an address, which is obtained by incrementing by one the row address except for the bank address, as a row address to be input to the decoder. 10. The semiconductor storage device of claim 4, further comprising: a switching section that switches whether or not the burst mode is to be executed, on the basis of a burst mode signal that is an input signal expressing whether or not the burst mode is to be executed.
In writing and reading data at a semiconductor storage device, control is carried out such that, at a time of a burst mode, in a case in which a value of a block address which is, from addresses assigned to a region of an internal address, an address for selecting a sense amplifier block from plural sense amplifier blocks, is a largest value, a first sense amplifier block and a second sense amplifier block are made to access different banks, and, in case in which the value of the block address is not the largest value, the first sense amplifier block and the second sense amplifier block are made to access a same bank of plural banks.1. A semiconductor storage device that has a plurality of banks, which include a plurality of word lines, and a plurality of sense amplifier blocks, which are shared between the plurality of banks respectively, and that, at a time of a burst mode, causes the plurality of sense amplifier blocks respectively, which are operated simultaneously with respect to the plurality of banks, to access any of the plurality of banks, the device comprising: a selecting section that, at the time of the burst mode, selects, from the plurality of sense amplifier blocks, a first sense amplifier block and a second sense amplifier block that are to be operated simultaneously, on the basis of, from addresses that are assigned to a region of an input internal address, a block address that is an address for selecting any of the sense amplifier blocks from the plurality of sense amplifier blocks, and a bank address that is an address for selecting any of the plurality of banks; a judging section that judges whether or not a value of the block address is a largest value; and a control section that carries out control so as to, in a case in which the value of the block address is the largest value, cause the first sense amplifier block and the second sense amplifier block to access different banks, and, in a case in which the value of the block address is not the largest value, cause the first sense amplifier block and the second sense amplifier block to access a same bank. 2. The semiconductor storage device of claim 1, further comprising: a word line selecting section that selects a word line for the same bank or for each of the respectively different banks that are accessed by the first sense amplifier block and the second sense amplifier block, on the basis of, from addresses assigned to a region of the internal address, a row address that includes the bank address and is an address for selecting any word line from the plurality of word lines, wherein a least significant bit of a bank address, which is, from addresses assigned to a region of the internal address, an address for selecting any of the plurality of banks, is assigned to a region of the internal address so as to become a bit that is one more significant than a most significant bit of the block address, and a least significant bit of the row address is the least significant bit of the bank address. 3. The semiconductor storage device of claim 2, further comprising: a bit line selecting section that, in a case in which a value of the block address is a largest value, judges whether or not the bank address is a largest value, and, in a case in which the bank address is not the largest value, selects a bit line indicated by a column address that is, from addresses assigned to a region of the internal address, an address for selecting a column, and, in a case in which the bank address is the largest value, selects a bit line that is different from the bit line indicated by the column address, wherein a least significant bit of the column address is assigned to a region of the internal address so as to become a bit that is one more significant than a most significant bit of the bank address. 4. A semiconductor storage device that has a plurality of banks, which include a plurality of word lines, and a plurality of sense amplifier blocks, which are shared between the plurality of banks respectively, and that, at a time of a burst mode, causes a plurality of sense amplifier blocks respectively, which are operated simultaneously with respect to the plurality of banks, to access any of the plurality of banks, the device comprising: a selecting section that, at the time of the burst mode, selects, from the plurality of sense amplifier blocks, a first sense amplifier block and a second sense amplifier block that are to be operated simultaneously, on the basis of, from addresses that are assigned to a region of an input internal address, a block address that is an address for selecting any of the sense amplifier blocks from the plurality of sense amplifier blocks, and a bank address that is an address for selecting any of the plurality of banks, and a redundant Y-block control signal that is for selecting a redundant memory array included in the plurality of banks respectively; a judging section that judges whether or not a value of the block address is a largest value; a control section that carries out control so as to, in a case in which the value of the block address is the largest value, cause the first sense amplifier block and the second sense amplifier block to access different banks, and, in a case in which the value of the block address is not the largest value, cause the first sense amplifier block and the second sense amplifier block to access the same bank; and a redundancy control section that, in a case in which the first sense amplifier block and the second sense amplifier block are made to access different banks of the first and second sense amplifier blocks, causes the redundant memory array to access a different sense amplifier block. 5. The semiconductor storage device of claim 4, further comprising: a word line selecting section that selects a word line for the same bank or for each of the respectively different banks that are accessed by the first sense amplifier block and the second sense amplifier block, on the basis of, from addresses assigned to a region of the internal address, a row address that includes the bank address and is an address for selecting any word line from the plurality of word lines, wherein a least significant bit of a bank address, which is, from addresses assigned to a region of the internal address, an address for selecting any of the plurality of banks, is assigned to a region of the internal address so as to become a bit that is one more significant than a most significant bit of the block address, and a least significant bit of the row address is the least significant bit of the bank address. 6. The semiconductor storage device of claim 5, further comprising: a bit line selecting section that, in a case in which a value of the block address is a largest value, judges whether or not the bank address is a largest value, and, in a case in which the bank address is not the largest value, selects a bit line indicated by a column address that is, from addresses assigned to a region of the internal address, an address for selecting a column, and, in a case in which the bank address is the largest value, for one of a column selector having a smallest address and a redundant column selector belonging to a less significant bank, selects a bit line that is different than the bit line indicated by the column address, and, for another of the column selectors, selects the bit line indicated by the column address, wherein a least significant bit of the column address is assigned to a region of the internal address so as to become a bit that is one more significant than a most significant bit of the bank address. 7. The semiconductor storage device of claim 3, further comprising: an incrementing circuit that, in a case in which the bank address is the largest value, judges whether or not the column address is a largest value, and, in a case in which it is judged whether or not the column address is the largest value and the bank address is not a largest value, selects a row address except for the bank address as a row address to be input to a decoder, and, in a case in which the column address is the largest value, selects an address, which is obtained by incrementing by one the row address except for the bank address, as a row address to be input to the decoder. 8. The semiconductor storage device of claim 1, further comprising: a switching section that switches whether or not the burst mode is to be executed, on the basis of a burst mode signal that is an input signal expressing whether or not the burst mode is to be executed. 9. The semiconductor storage device of claim 6, further comprising: an incrementing circuit that, in a case in which the bank address is the largest value, judges whether or not the column address is a largest value, and, in a case in which it is judged whether or not the column address is the largest value and the bank address is not a largest value, selects a row address except for the bank address as a row address to be input to a decoder, and, in a case in which the column address is the largest value, selects an address, which is obtained by incrementing by one the row address except for the bank address, as a row address to be input to the decoder. 10. The semiconductor storage device of claim 4, further comprising: a switching section that switches whether or not the burst mode is to be executed, on the basis of a burst mode signal that is an input signal expressing whether or not the burst mode is to be executed.
3,600
344,472
16,803,953
3,642
A vaccine comprising a protein immunogen capable of stimulating a protective immune response against snake venom as well as spider and bee venoms. The DNA encoding the protein is disclosed. The protein can be expressed in both recombinant host cells. The protein is useful as a thermostable, parenteral administration anti venom vaccine protective against envenomation by diverse snake species, spiders and bees.
1. An immunogenic composition comprising all or an immunogenic portion of a gpMuc protein in a pharmaceutically acceptable carrier. 2. The composition of claim 1 wherein the composition is thermostable up to 50° C. 3. The composition of claim 1 wherein the composition is formulated for parenteral administration vaccine with a pH of 4.6-6.5. 4. An isolated nucleic acid comprising a sequence of SEQ. ID No. 1. 5. The isolated nucleic acid of claim 4 wherein the sequence is carried on an expression vector. 6. A purified and isolated polypeptide encoded by SEQ. ID NO 1. 7. The purified and isolated polypeptide of claim 6 wherein the polypeptide comprises a full-length polypeptide encoded by SEQ. ID NO 1. 8. The purified and isolated polypeptide of claim 6 wherein the purified and isolated polypeptide comprises a portion of the purified and isolated polypeptide encoded by SEQ. ID NO 1.
A vaccine comprising a protein immunogen capable of stimulating a protective immune response against snake venom as well as spider and bee venoms. The DNA encoding the protein is disclosed. The protein can be expressed in both recombinant host cells. The protein is useful as a thermostable, parenteral administration anti venom vaccine protective against envenomation by diverse snake species, spiders and bees.1. An immunogenic composition comprising all or an immunogenic portion of a gpMuc protein in a pharmaceutically acceptable carrier. 2. The composition of claim 1 wherein the composition is thermostable up to 50° C. 3. The composition of claim 1 wherein the composition is formulated for parenteral administration vaccine with a pH of 4.6-6.5. 4. An isolated nucleic acid comprising a sequence of SEQ. ID No. 1. 5. The isolated nucleic acid of claim 4 wherein the sequence is carried on an expression vector. 6. A purified and isolated polypeptide encoded by SEQ. ID NO 1. 7. The purified and isolated polypeptide of claim 6 wherein the polypeptide comprises a full-length polypeptide encoded by SEQ. ID NO 1. 8. The purified and isolated polypeptide of claim 6 wherein the purified and isolated polypeptide comprises a portion of the purified and isolated polypeptide encoded by SEQ. ID NO 1.
3,600
344,473
16,873,201
3,642
A disc brake that can be operated via cable, for reliable use such as emergency brakes.
1. A disc brake for vehicles, which allows its calipers to move, (such as to engage, or disengage) only by means of the flexibility of the material, (to which is mounted the brakepad, (or any other material which creates friction) when pressure is applied to the calipers.
A disc brake that can be operated via cable, for reliable use such as emergency brakes.1. A disc brake for vehicles, which allows its calipers to move, (such as to engage, or disengage) only by means of the flexibility of the material, (to which is mounted the brakepad, (or any other material which creates friction) when pressure is applied to the calipers.
3,600
344,474
16,803,939
3,642
A disc brake that can be operated via cable, for reliable use such as emergency brakes.
1. A disc brake for vehicles, which allows its calipers to move, (such as to engage, or disengage) only by means of the flexibility of the material, (to which is mounted the brakepad, (or any other material which creates friction) when pressure is applied to the calipers.
A disc brake that can be operated via cable, for reliable use such as emergency brakes.1. A disc brake for vehicles, which allows its calipers to move, (such as to engage, or disengage) only by means of the flexibility of the material, (to which is mounted the brakepad, (or any other material which creates friction) when pressure is applied to the calipers.
3,600
344,475
16,803,912
3,642
Methods, systems, and devices for wireless communication are described. The payload size for uplink transmissions of unscheduled control information may vary and, in some cases, may be dynamically determined. A user equipment (UE) may determine a payload size or may select a payload size from a set of predetermined sizes. A base station may independently determine the same payload size or it may blindly detect the payload size upon receiving the uplink (UL) transmission. Or the base station may indicate the payload size to the UE. Additionally, UL grants issued to the UE may take one of several forms (e.g., different downlink control indicator formats), and characteristics of the grant may indicate information about resources assigned by the grant, including a location of the resources among various transmission opportunities or whether the grant is for multiple subframes.
1. A method of wireless communication comprising: transmitting a common downlink control message that includes an indication of available uplink frequency resources of a shared radio frequency spectrum band; and receiving an unscheduled uplink control message using the available uplink frequency resources, wherein the unscheduled uplink control message has a payload size determined based at least in part on uplink control information (UCI) included in the unscheduled uplink control message. 2. The method of claim 1, wherein the UCI included in the unscheduled uplink control message is determined based at least in part on a number of component carriers for which to acknowledge transmissions, a number of hybrid automatic repeat request (HARM) processes, a number of bits to convey channel state information (CSI), a system bandwidth, a UCI multiplexing scheme, or a user equipment (UE) coverage range. 3. The method of claim 1, further comprising: identifying a set of available payload sizes; and detecting the payload size based at least in part on the set of available payload sizes. 4. The method of claim 1, wherein the common downlink control message includes an indication of the payload size and the payload size is determined based at least in part on the indication. 5. The method of claim 1, wherein the unscheduled uplink control message is received using four or fewer modulation symbols associated with the available uplink frequency resources. 6. The method of claim 1, wherein the indication of available uplink frequency resources is an indication of a subframe type. 7. The method of claim 1, wherein the common downlink control message includes additional information associated with a format of the UCI to be included in the unscheduled uplink control message. 8. The method of claim 1, wherein the available uplink frequency resources are associated with a special subframe that includes resources designated for both uplink and downlink communication. 9. The method of claim 1, wherein the available uplink frequency resources are associated with a periodic uplink subframe. 10. The method of claim 9, wherein the periodic uplink subframe is designated for random access transmissions. 11. The method of claim 1, further comprising transmitting a trigger for transmitting the unscheduled uplink control message using the available uplink frequency resources. 12. An apparatus for wireless communication, comprising: a processor; memory coupled to the processor; and instructions stored in the memory and operable, when executed by the processor, to cause the apparatus to: transmit a common downlink control message that includes an indication of available uplink frequency resources of a shared radio frequency spectrum band; and receive an unscheduled uplink control message using the available uplink frequency resources, wherein the unscheduled uplink control message has a payload size determined based at least in part on uplink control information (UCI) included in the unscheduled uplink control message. 13. The apparatus of claim 12, wherein the UCI included in the unscheduled uplink control message is determined based at least in part on a number of component carriers for which to acknowledge transmissions, a number of hybrid automatic repeat request (HARQ) processes, a number of bits to convey channel state information (CSI), a system bandwidth, a UCI multiplexing scheme, or a user equipment (UE) coverage range. 14. The apparatus of claim 12, further comprising instructions operable to cause the apparatus to: identify a set of available payload sizes; and detect the payload size based at least in part on the set of available payload sizes. 15. The apparatus of claim 12, wherein the common downlink control message includes an indication of the payload size and the payload size is determined based at least in part on the indication. 16. The apparatus of claim 12, wherein the unscheduled uplink control message is received using four or fewer modulation symbols associated with the available uplink frequency resources. 17. The apparatus of claim 12, wherein the indication of available uplink frequency resources is an indication of a subframe type. 18. The apparatus of claim 12, wherein the common downlink control message includes additional information associated with a format of the UCI to be included in the unscheduled uplink control message. 19. The apparatus of claim 12, wherein the available uplink frequency resources are associated with a special subframe that includes resources designated for both uplink and downlink communication. 20. The apparatus of claim 12, wherein the available uplink frequency resources are associated with a periodic uplink subframe. 21. The apparatus of claim 20, wherein the periodic uplink subframe is designated for random access transmissions. 22. The apparatus of claim 12, further comprising instructions operable to cause the apparatus to transmit a trigger for transmitting the unscheduled uplink control message using the available uplink frequency resources. 23. A non-transitory computer-readable medium storing code for wireless communication, the code comprising instructions executable to: transmit a common downlink control message that includes an indication of available uplink frequency resources of a shared radio frequency spectrum band; and receive an unscheduled uplink control message using the available uplink frequency resources, wherein the unscheduled uplink control message has a payload size determined based at least in part on uplink control information (UCI) included in the unscheduled uplink control message. 24. The non-transitory computer-readable medium of claim 23, wherein the UCI included in the unscheduled uplink control message is determined based at least in part on a number of component carriers for which to acknowledge transmissions, a number of hybrid automatic repeat request (HARQ) processes, a number of bits to convey channel state information (CSI), a system bandwidth, a UCI multiplexing scheme, or a user equipment (UE) coverage range. 25. The non-transitory computer-readable medium of claim 23, further comprising instructions executable to: identify a set of available payload sizes; and detect the payload size based at least in part on the set of available payload sizes. 26. The non-transitory computer-readable medium of claim 23, wherein the common downlink control message includes an indication of the payload size and the payload size is determined based at least in part on the indication. 27. The non-transitory computer-readable medium of claim 23, wherein the unscheduled uplink control message is received using four or fewer modulation symbols associated with the available uplink frequency resources. 28. The non-transitory computer-readable medium of claim 23, wherein the indication of available uplink frequency resources is an indication of a subframe type. 29. The non-transitory computer-readable medium of claim 23, wherein the common downlink control message includes additional information associated with a format of the UCI to be included in the unscheduled uplink control message. 30. The non-transitory computer-readable medium of claim 23, wherein the available uplink frequency resources are associated with a special subframe that includes resources designated for both uplink and downlink communication. 31. The non-transitory computer-readable medium of claim 23, wherein the available uplink frequency resources are associated with a periodic uplink subframe. 32. The non-transitory computer-readable medium of claim 31, wherein the periodic uplink subframe is designated for random access transmissions. 33. The non-transitory computer-readable medium of claim 23, further comprising instructions executable to transmit a trigger for transmitting the unscheduled uplink control message using the available uplink frequency resources. 34. An apparatus for wireless communication, comprising: means for transmitting a common downlink control message that includes an indication of available uplink frequency resources of a shared radio frequency spectrum band; and means for receiving an unscheduled uplink control message using the available uplink frequency resources, wherein the unscheduled uplink control message has a payload size determined based at least in part on uplink control information (UCI) included in the unscheduled uplink control message. 35. The apparatus of claim 34, wherein the UCI included in the unscheduled uplink control message is determined based at least in part on a number of component carriers for which to acknowledge transmissions, a number of hybrid automatic repeat request (HARQ) processes, a number of bits to convey channel state information (CSI), a system bandwidth, a UCI multiplexing scheme, or a user equipment (UE) coverage range. 36. The apparatus of claim 34, further comprising: means for identifying a set of available payload sizes; and means for detecting the payload size based at least in part on the set of available payload sizes. 37. The apparatus of claim 34, wherein the common downlink control message includes an indication of the payload size and the payload size is determined based at least in part on the indication. 38. The apparatus of claim 34, wherein the unscheduled uplink control message is received using four or fewer modulation symbols associated with the available uplink frequency resources. 39. The apparatus of claim 34, wherein the indication of available uplink frequency resources is an indication of a subframe type. 40. The apparatus of claim 34, wherein the common downlink control message includes additional information associated with a format of the UCI to be included in the unscheduled uplink control message. 41. The apparatus of claim 34, wherein the available uplink frequency resources are associated with a special subframe that includes resources designated for both uplink and downlink communication. 42. The apparatus of claim 34, wherein the available uplink frequency resources are associated with a periodic uplink subframe. 43. The apparatus of claim 42, wherein the periodic uplink subframe is designated for random access transmissions. 44. The apparatus of claim 34, further comprising means for transmitting a trigger for transmitting the unscheduled uplink control message using the available uplink frequency resources.
Methods, systems, and devices for wireless communication are described. The payload size for uplink transmissions of unscheduled control information may vary and, in some cases, may be dynamically determined. A user equipment (UE) may determine a payload size or may select a payload size from a set of predetermined sizes. A base station may independently determine the same payload size or it may blindly detect the payload size upon receiving the uplink (UL) transmission. Or the base station may indicate the payload size to the UE. Additionally, UL grants issued to the UE may take one of several forms (e.g., different downlink control indicator formats), and characteristics of the grant may indicate information about resources assigned by the grant, including a location of the resources among various transmission opportunities or whether the grant is for multiple subframes.1. A method of wireless communication comprising: transmitting a common downlink control message that includes an indication of available uplink frequency resources of a shared radio frequency spectrum band; and receiving an unscheduled uplink control message using the available uplink frequency resources, wherein the unscheduled uplink control message has a payload size determined based at least in part on uplink control information (UCI) included in the unscheduled uplink control message. 2. The method of claim 1, wherein the UCI included in the unscheduled uplink control message is determined based at least in part on a number of component carriers for which to acknowledge transmissions, a number of hybrid automatic repeat request (HARM) processes, a number of bits to convey channel state information (CSI), a system bandwidth, a UCI multiplexing scheme, or a user equipment (UE) coverage range. 3. The method of claim 1, further comprising: identifying a set of available payload sizes; and detecting the payload size based at least in part on the set of available payload sizes. 4. The method of claim 1, wherein the common downlink control message includes an indication of the payload size and the payload size is determined based at least in part on the indication. 5. The method of claim 1, wherein the unscheduled uplink control message is received using four or fewer modulation symbols associated with the available uplink frequency resources. 6. The method of claim 1, wherein the indication of available uplink frequency resources is an indication of a subframe type. 7. The method of claim 1, wherein the common downlink control message includes additional information associated with a format of the UCI to be included in the unscheduled uplink control message. 8. The method of claim 1, wherein the available uplink frequency resources are associated with a special subframe that includes resources designated for both uplink and downlink communication. 9. The method of claim 1, wherein the available uplink frequency resources are associated with a periodic uplink subframe. 10. The method of claim 9, wherein the periodic uplink subframe is designated for random access transmissions. 11. The method of claim 1, further comprising transmitting a trigger for transmitting the unscheduled uplink control message using the available uplink frequency resources. 12. An apparatus for wireless communication, comprising: a processor; memory coupled to the processor; and instructions stored in the memory and operable, when executed by the processor, to cause the apparatus to: transmit a common downlink control message that includes an indication of available uplink frequency resources of a shared radio frequency spectrum band; and receive an unscheduled uplink control message using the available uplink frequency resources, wherein the unscheduled uplink control message has a payload size determined based at least in part on uplink control information (UCI) included in the unscheduled uplink control message. 13. The apparatus of claim 12, wherein the UCI included in the unscheduled uplink control message is determined based at least in part on a number of component carriers for which to acknowledge transmissions, a number of hybrid automatic repeat request (HARQ) processes, a number of bits to convey channel state information (CSI), a system bandwidth, a UCI multiplexing scheme, or a user equipment (UE) coverage range. 14. The apparatus of claim 12, further comprising instructions operable to cause the apparatus to: identify a set of available payload sizes; and detect the payload size based at least in part on the set of available payload sizes. 15. The apparatus of claim 12, wherein the common downlink control message includes an indication of the payload size and the payload size is determined based at least in part on the indication. 16. The apparatus of claim 12, wherein the unscheduled uplink control message is received using four or fewer modulation symbols associated with the available uplink frequency resources. 17. The apparatus of claim 12, wherein the indication of available uplink frequency resources is an indication of a subframe type. 18. The apparatus of claim 12, wherein the common downlink control message includes additional information associated with a format of the UCI to be included in the unscheduled uplink control message. 19. The apparatus of claim 12, wherein the available uplink frequency resources are associated with a special subframe that includes resources designated for both uplink and downlink communication. 20. The apparatus of claim 12, wherein the available uplink frequency resources are associated with a periodic uplink subframe. 21. The apparatus of claim 20, wherein the periodic uplink subframe is designated for random access transmissions. 22. The apparatus of claim 12, further comprising instructions operable to cause the apparatus to transmit a trigger for transmitting the unscheduled uplink control message using the available uplink frequency resources. 23. A non-transitory computer-readable medium storing code for wireless communication, the code comprising instructions executable to: transmit a common downlink control message that includes an indication of available uplink frequency resources of a shared radio frequency spectrum band; and receive an unscheduled uplink control message using the available uplink frequency resources, wherein the unscheduled uplink control message has a payload size determined based at least in part on uplink control information (UCI) included in the unscheduled uplink control message. 24. The non-transitory computer-readable medium of claim 23, wherein the UCI included in the unscheduled uplink control message is determined based at least in part on a number of component carriers for which to acknowledge transmissions, a number of hybrid automatic repeat request (HARQ) processes, a number of bits to convey channel state information (CSI), a system bandwidth, a UCI multiplexing scheme, or a user equipment (UE) coverage range. 25. The non-transitory computer-readable medium of claim 23, further comprising instructions executable to: identify a set of available payload sizes; and detect the payload size based at least in part on the set of available payload sizes. 26. The non-transitory computer-readable medium of claim 23, wherein the common downlink control message includes an indication of the payload size and the payload size is determined based at least in part on the indication. 27. The non-transitory computer-readable medium of claim 23, wherein the unscheduled uplink control message is received using four or fewer modulation symbols associated with the available uplink frequency resources. 28. The non-transitory computer-readable medium of claim 23, wherein the indication of available uplink frequency resources is an indication of a subframe type. 29. The non-transitory computer-readable medium of claim 23, wherein the common downlink control message includes additional information associated with a format of the UCI to be included in the unscheduled uplink control message. 30. The non-transitory computer-readable medium of claim 23, wherein the available uplink frequency resources are associated with a special subframe that includes resources designated for both uplink and downlink communication. 31. The non-transitory computer-readable medium of claim 23, wherein the available uplink frequency resources are associated with a periodic uplink subframe. 32. The non-transitory computer-readable medium of claim 31, wherein the periodic uplink subframe is designated for random access transmissions. 33. The non-transitory computer-readable medium of claim 23, further comprising instructions executable to transmit a trigger for transmitting the unscheduled uplink control message using the available uplink frequency resources. 34. An apparatus for wireless communication, comprising: means for transmitting a common downlink control message that includes an indication of available uplink frequency resources of a shared radio frequency spectrum band; and means for receiving an unscheduled uplink control message using the available uplink frequency resources, wherein the unscheduled uplink control message has a payload size determined based at least in part on uplink control information (UCI) included in the unscheduled uplink control message. 35. The apparatus of claim 34, wherein the UCI included in the unscheduled uplink control message is determined based at least in part on a number of component carriers for which to acknowledge transmissions, a number of hybrid automatic repeat request (HARQ) processes, a number of bits to convey channel state information (CSI), a system bandwidth, a UCI multiplexing scheme, or a user equipment (UE) coverage range. 36. The apparatus of claim 34, further comprising: means for identifying a set of available payload sizes; and means for detecting the payload size based at least in part on the set of available payload sizes. 37. The apparatus of claim 34, wherein the common downlink control message includes an indication of the payload size and the payload size is determined based at least in part on the indication. 38. The apparatus of claim 34, wherein the unscheduled uplink control message is received using four or fewer modulation symbols associated with the available uplink frequency resources. 39. The apparatus of claim 34, wherein the indication of available uplink frequency resources is an indication of a subframe type. 40. The apparatus of claim 34, wherein the common downlink control message includes additional information associated with a format of the UCI to be included in the unscheduled uplink control message. 41. The apparatus of claim 34, wherein the available uplink frequency resources are associated with a special subframe that includes resources designated for both uplink and downlink communication. 42. The apparatus of claim 34, wherein the available uplink frequency resources are associated with a periodic uplink subframe. 43. The apparatus of claim 42, wherein the periodic uplink subframe is designated for random access transmissions. 44. The apparatus of claim 34, further comprising means for transmitting a trigger for transmitting the unscheduled uplink control message using the available uplink frequency resources.
3,600
344,476
16,803,895
3,642
A mirror assembly can include a housing, a mirror, and a light source. In certain embodiments, the mirror is rotatable within a support portion of the mirror assembly. In some embodiments, the mirror assembly includes a light pipe configured to emit a substantially constant amount of light along a periphery of the mirror. In some embodiments, the mirror assembly includes a sensor assembly. The sensor assembly can be configured to adjust the amount of emitted light based on the position of a user in relation to the mirror.
1. A mirror assembly comprising: a mirror head comprising a front side and a back side; a housing portion; a support portion coupled to the housing portion and positioned around at least a portion of a periphery of the mirror head; a pivot assembly configured to allow rotation of the mirror head about an axis formed by the pivot assembly; a drive assembly disposed within the mirror head, the drive assembly configured to rotate the mirror head about the axis formed by the pivot assembly; and an actuator configured to initiate the drive assembly to rotate the mirror head. 2. The mirror assembly of claim 1, wherein the pivot assembly is configured to allow rotation of the mirror head relative to the support portion. 3. The mirror assembly of claim 1, wherein the support portion is configured to tilt relative to the housing portion. 4. (canceled) 5. The mirror assembly of claim 1, wherein the drive assembly comprises a motor and a drive shaft. 6. (canceled) 7. (canceled) 8. (canceled) 9. (canceled) 10. (canceled) 11. (canceled) 12. The mirror assembly of claim 1, further comprising a sensing element configured to provide an indication of a position of the mirror head. 13. The mirror assembly of claim 12, wherein the sensing element is a potentiometer. 14. The mirror assembly of claim 12, further comprising a controller configured to stop rotation of the mirror head based on the indication of the position of the mirror head. 15. The mirror assembly of claim 1, further comprising a clutch mechanism configured to receive torque from the drive assembly so as to rotate the mirror head, the clutch mechanism being configured to move relative to the drive assembly when the mirror head is rotated generally without operation of the drive assembly. 16. The mirror assembly of wherein the actuator is a button. 17. The mirror assembly of claim 1, wherein the actuator is a capacitive touch sensor. 18. The mirror assembly of claim 1, further comprising a display. 19. The mirror assembly of claim 18, wherein the display is mounted within the mirror head such that content on the display can be viewed through a mirror on the front side of the mirror head. 20. (canceled) 21. (canceled) 22. (canceled) 23. A mirror assembly comprising: a housing portion; a mirror head comprising a front side and a back side; a support portion coupled to the housing portion and positioned around at least a portion of a periphery of the mirror head, the support portion comprising at least one light source configured to emit light; and an actuator configured to initiate rotation of the mirror head between the front side and the back side, the actuator configured to control a parameter of the light emitted from the at least one light source. 24. The mirror assembly of claim 23, further comprising a display, wherein the actuator is configured to control a parameter of the display. 25. The mirror assembly of claim 23, wherein the actuator is a capacitive touch sensor. 26. (canceled) 27. The mirror assembly of claim 23, further comprising: a pivot assembly configured to allow rotation of the mirror head about an axis formed by the pivot assembly; and a drive assembly disposed within the mirror head, the drive assembly configured to rotate the mirror head about the axis formed by the pivot assembly. 28. The mirror assembly of claim 27, wherein the drive assembly comprises a motor and a drive shaft. 29. (canceled) 30. (canceled) 31. The mirror assembly of claim 27, further comprising a clutch mechanism configured to move relative to the drive assembly when the mirror head is rotated generally without operation of the drive assembly. 32. The mirror assembly of claim 27, further comprising a sensing element configured to provide an indication of a position of the mirror head. 33. The mirror assembly of claim 32, wherein the sensing element is a potentiometer.
A mirror assembly can include a housing, a mirror, and a light source. In certain embodiments, the mirror is rotatable within a support portion of the mirror assembly. In some embodiments, the mirror assembly includes a light pipe configured to emit a substantially constant amount of light along a periphery of the mirror. In some embodiments, the mirror assembly includes a sensor assembly. The sensor assembly can be configured to adjust the amount of emitted light based on the position of a user in relation to the mirror.1. A mirror assembly comprising: a mirror head comprising a front side and a back side; a housing portion; a support portion coupled to the housing portion and positioned around at least a portion of a periphery of the mirror head; a pivot assembly configured to allow rotation of the mirror head about an axis formed by the pivot assembly; a drive assembly disposed within the mirror head, the drive assembly configured to rotate the mirror head about the axis formed by the pivot assembly; and an actuator configured to initiate the drive assembly to rotate the mirror head. 2. The mirror assembly of claim 1, wherein the pivot assembly is configured to allow rotation of the mirror head relative to the support portion. 3. The mirror assembly of claim 1, wherein the support portion is configured to tilt relative to the housing portion. 4. (canceled) 5. The mirror assembly of claim 1, wherein the drive assembly comprises a motor and a drive shaft. 6. (canceled) 7. (canceled) 8. (canceled) 9. (canceled) 10. (canceled) 11. (canceled) 12. The mirror assembly of claim 1, further comprising a sensing element configured to provide an indication of a position of the mirror head. 13. The mirror assembly of claim 12, wherein the sensing element is a potentiometer. 14. The mirror assembly of claim 12, further comprising a controller configured to stop rotation of the mirror head based on the indication of the position of the mirror head. 15. The mirror assembly of claim 1, further comprising a clutch mechanism configured to receive torque from the drive assembly so as to rotate the mirror head, the clutch mechanism being configured to move relative to the drive assembly when the mirror head is rotated generally without operation of the drive assembly. 16. The mirror assembly of wherein the actuator is a button. 17. The mirror assembly of claim 1, wherein the actuator is a capacitive touch sensor. 18. The mirror assembly of claim 1, further comprising a display. 19. The mirror assembly of claim 18, wherein the display is mounted within the mirror head such that content on the display can be viewed through a mirror on the front side of the mirror head. 20. (canceled) 21. (canceled) 22. (canceled) 23. A mirror assembly comprising: a housing portion; a mirror head comprising a front side and a back side; a support portion coupled to the housing portion and positioned around at least a portion of a periphery of the mirror head, the support portion comprising at least one light source configured to emit light; and an actuator configured to initiate rotation of the mirror head between the front side and the back side, the actuator configured to control a parameter of the light emitted from the at least one light source. 24. The mirror assembly of claim 23, further comprising a display, wherein the actuator is configured to control a parameter of the display. 25. The mirror assembly of claim 23, wherein the actuator is a capacitive touch sensor. 26. (canceled) 27. The mirror assembly of claim 23, further comprising: a pivot assembly configured to allow rotation of the mirror head about an axis formed by the pivot assembly; and a drive assembly disposed within the mirror head, the drive assembly configured to rotate the mirror head about the axis formed by the pivot assembly. 28. The mirror assembly of claim 27, wherein the drive assembly comprises a motor and a drive shaft. 29. (canceled) 30. (canceled) 31. The mirror assembly of claim 27, further comprising a clutch mechanism configured to move relative to the drive assembly when the mirror head is rotated generally without operation of the drive assembly. 32. The mirror assembly of claim 27, further comprising a sensing element configured to provide an indication of a position of the mirror head. 33. The mirror assembly of claim 32, wherein the sensing element is a potentiometer.
3,600
344,477
16,803,948
3,642
Some embodiments include a memory cell with two transistors and one capacitor. The transistors are a first transistor and a second transistor. The capacitor has a first node coupled with a source/drain region of the first transistor, and has a second node coupled with a source/drain region of the second transistor. The memory cell has a first body region adjacent the source/drain region of the first transistor, and has a second body region adjacent the source/drain region of the second transistor. A first body connection line couples the first body region of the memory cell to a first reference voltage. A second body connection line couples the second body region of the memory cell to a second reference voltage. The first and second reference voltages may be the same as one another, or may be different from one another.
1-20. (canceled) 21. An apparatus, comprising: a memory cell comprising two transistors and one capacitor; the two transistors being a first transistor and a second transistor, the first transistor spaced in a lateral direction from the second transistor, the first transistor comprising a body region; the capacitor having a first node coupled with a source/drain region of the first transistor and having a second node coupled with a source/drain region of the second transistor; and a body connection line coupling the body region of the first transistor to a conductive region having a first reference voltage. 22. The apparatus of claim 21 wherein the first reference voltage comprises a ground voltage. 23. The apparatus of claim 21 wherein the body connection line comprises a length dimension that extends perpendicularly to the lateral direction. 24. The apparatus of claim 21 wherein the second transistor comprises a body region, and further comprising: a body connection line coupling the body region of the second transistor to a conductive region having a second reference voltage, the first and second reference voltages are the same reference voltage. 25. The apparatus of claim 21 wherein the second transistor comprises a body region, and further comprising: a body connection line coupling the body region of the second transistor to a conductive region having a second reference voltage, the first and second reference voltages are different reference voltages. 26. The apparatus of claim 21 wherein the second transistor comprises a body region, and further comprising: a body connection line coupling the body region of the second transistor to a conductive region having a second reference voltage, the first and second reference voltages are a ground voltage. 27. The apparatus of claim 21 wherein the second transistor comprises a body region, and further comprising: a body connection line coupling the body region of the second transistor to a conductive region having a second reference voltage, the first and second reference voltages are a common plate voltage. 28. The apparatus of claim 21 wherein: the conductive region is a bitline that extends along a plane; and the body connection line extends substantially parallel to the bitline. 29. The apparatus of claim 21 wherein the body connection line comprises a conductivity type opposite to the source/drain region source/drain regions. 30. The apparatus of claim 21 wherein the conductive region is a bitline, and further comprising a spacing region that spaces the bitline from the body connection line. 31. The apparatus of claim 21 wherein the spacing region is configured as a line that extends substantially parallel to the body connection line. 32. The apparatus of claim 21 wherein the body connection line comprises semiconductor material. 33. The apparatus of claim 21 wherein the body connection line comprises doped semiconductor material. 34. The apparatus of claim 21 further comprising pocket regions along the body connection line. 35. The apparatus of claim 34 wherein the pocket regions comprises higher charge carrier concentration than other region of the body connection line.
Some embodiments include a memory cell with two transistors and one capacitor. The transistors are a first transistor and a second transistor. The capacitor has a first node coupled with a source/drain region of the first transistor, and has a second node coupled with a source/drain region of the second transistor. The memory cell has a first body region adjacent the source/drain region of the first transistor, and has a second body region adjacent the source/drain region of the second transistor. A first body connection line couples the first body region of the memory cell to a first reference voltage. A second body connection line couples the second body region of the memory cell to a second reference voltage. The first and second reference voltages may be the same as one another, or may be different from one another.1-20. (canceled) 21. An apparatus, comprising: a memory cell comprising two transistors and one capacitor; the two transistors being a first transistor and a second transistor, the first transistor spaced in a lateral direction from the second transistor, the first transistor comprising a body region; the capacitor having a first node coupled with a source/drain region of the first transistor and having a second node coupled with a source/drain region of the second transistor; and a body connection line coupling the body region of the first transistor to a conductive region having a first reference voltage. 22. The apparatus of claim 21 wherein the first reference voltage comprises a ground voltage. 23. The apparatus of claim 21 wherein the body connection line comprises a length dimension that extends perpendicularly to the lateral direction. 24. The apparatus of claim 21 wherein the second transistor comprises a body region, and further comprising: a body connection line coupling the body region of the second transistor to a conductive region having a second reference voltage, the first and second reference voltages are the same reference voltage. 25. The apparatus of claim 21 wherein the second transistor comprises a body region, and further comprising: a body connection line coupling the body region of the second transistor to a conductive region having a second reference voltage, the first and second reference voltages are different reference voltages. 26. The apparatus of claim 21 wherein the second transistor comprises a body region, and further comprising: a body connection line coupling the body region of the second transistor to a conductive region having a second reference voltage, the first and second reference voltages are a ground voltage. 27. The apparatus of claim 21 wherein the second transistor comprises a body region, and further comprising: a body connection line coupling the body region of the second transistor to a conductive region having a second reference voltage, the first and second reference voltages are a common plate voltage. 28. The apparatus of claim 21 wherein: the conductive region is a bitline that extends along a plane; and the body connection line extends substantially parallel to the bitline. 29. The apparatus of claim 21 wherein the body connection line comprises a conductivity type opposite to the source/drain region source/drain regions. 30. The apparatus of claim 21 wherein the conductive region is a bitline, and further comprising a spacing region that spaces the bitline from the body connection line. 31. The apparatus of claim 21 wherein the spacing region is configured as a line that extends substantially parallel to the body connection line. 32. The apparatus of claim 21 wherein the body connection line comprises semiconductor material. 33. The apparatus of claim 21 wherein the body connection line comprises doped semiconductor material. 34. The apparatus of claim 21 further comprising pocket regions along the body connection line. 35. The apparatus of claim 34 wherein the pocket regions comprises higher charge carrier concentration than other region of the body connection line.
3,600
344,478
16,803,949
3,697
The present disclosure provides a financial card with function of fingerprint verification and a working method therefor, which belongs to information technology field The financial card with function of fingerprint verification includes: a waiting and receiving module (401), a determining module (402), a storing module (403), a first sending module (404), a second sending module (405), a third sending module (406), an application cryptogram module (407) and a fourth sending module (408). The financial card provided by the present disclosure further includes a cardholder verifying module and/or a boot-up verifying module The solution provided by the present disclosure improves security of the identity verification in an c- transaction and makes the e-transaction to be more convenient by using the fingerprint to execute identity verification.
1. A working method for a financial card with function of fingerprint verification, comprising: Step S1, waiting, by the financial card, to receive a command from a host computer; Step S2, determining, by the financial card, a type of the command when the command from the host computer is received, if the financial card determines that the type of the command is an application selecting command, executing Step S3; if the financial card determines that the type of the command is a processing option acquiring command, executing Step S4; if the financial card determines that the type of the command is an application data reading command, executing Step S5; if the financial card determines that the type of the command is an application cryptogram acquiring command, executing Step S6; Step S3, sending, by the financial card, application information supported by itself to the host computer; Step S4, sending, by the financial card, file information to the host computer; Step S5, sending, by the financial card, application data corresponding to a file identification in the application data reading command to the host computer; Step S6, executing, by the financial card, card behavior analysis and generating application cryptogram, sending the application cryptogram to the host computer; and the method further comprises at least one of steps of: if the financial card determines that the type of the received command is a verifying command and the verifying command is specifically a fingerprint verifying command in the Step S2, executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer; and, before the Step S1, the method further comprises: if the financial card receives a boot-up event, executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user, executing the Step S1 if the boot-up verification is successful. 2. The method of claim 1, wherein the Step S2 further comprises: if the financial card determines that the received command is a transaction verifying command, executing Step S0; Step S0, prompting, by the financial card, the user to input transaction verifying information, executing transaction verification on the transaction verifying information input by the user after receiving the transaction verifying information input by the user, if the transaction verification is successful, returning information that the transaction verification is successful to the host computer; otherwise, returning information that the transaction verification is failed to the host computer and ending transaction. 3. The method of claim 1, wherein the executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user comprises: Step H1, prompting, by the financial card, the user to input a fingerprint; and Step H2, verifying, by the financial card, the fingerprint input by the user according to the self-stored user registration fingerprint when the financial card obtains the fingerprint input by the user. 4. The method of claim 1, wherein the executing, by the financial card, financial card boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user comprises: computing, by the financial card, fingerprint feature according to the fingerprint input by the user, determining whether the computed fingerprint feature is consistent with the fingerprint feature of the self-stored user registration fingerprint, if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; if the boot-up verification is successful, the method further comprises: storing, by the financial card, the computed fingerprint feature; wherein the fingerprint verifying command is specifically an online fingerprint verifying command; wherein the executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer comprises: sending, by the financial card, the stored fingerprint feature to the host computer. 5. The method of claim 1, wherein if the financial card executes boot-up verification according to self-stored user registration fingerprint and the fingerprint input by the user and the boot-up verification is successful, the method further comprises: storing, by the financial card, a result of successful verification; wherein the fingerprint verifying command is specifically an offline fingerprint verifying command; and wherein the executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer comprises: generating, by the financial card, information that offline fingerprint verification is successful according to the stored result of successful card holder verification and sending the information that the offline fingerprint verification is successful to the host computer. 6. The method of claim 1, wherein when before the Step S1, the method further comprises: if the financial card receives a boot-up event, executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user, and if the boot-up verification is successful: the file information sent by the financial card to the host computer in the Step S4 comprises record information related to an online verification code; the application data sent by the financial card to the host computer in the Step S5 comprises an online verification code corresponding to a recording information of an online verification code in the application data reading command. 7. The method of claim 1, wherein the executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user comprises: computing, by the financial card, fingerprint feature according to the fingerprint input by the user, determining whether the computed fingerprint feature is consistent with the fingerprint feature of the self-stored user registration fingerprint, if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; if the boot-up verification is successful, the method further comprises: storing, by the financial card, the computed fingerprint feature; wherein the file information sent by the financial card to the host computer in the Step S4 comprises recording information related to the fingerprint feature; wherein the application data sent by the financial card to the host computer in the Step S5 comprises fingerprint feature corresponding to the recording information of the fingerprint feature in the application data reading command. 8. The method of claim 6, wherein the fingerprint verifying command is specifically an offline fingerprint verifying command; wherein the executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer comprises: waiting for, by the financial card, the user to input fingerprint; executing card holder verification on the fingerprint input by the user according to the self-stored user registration fingerprint when the financial card obtains the fingerprint input by the user; if the card holder verification is successful, returning, by the financial card, the information that offline fingerprint verification is successful to the host computer; otherwise, returning, by the financial card, information that the offline fingerprint verification is failed to the host computer. 9. The method of claim 1, wherein the receiving, by the financial card, a boot-up event comprises: the financial card being powered up, or the financial card receives the boot-up event from a user. 10. The method of claim 1, wherein the financial card communicates data with the host computer via Bluetooth. 11. A financial card with function of fingerprint verification, comprising a processor, a transmitter and a memory storing instructions thereon, the processor when executing the instructions, being configured to: wait to receive a command from a host computer; determine a type of the command when the command from the host computer is received; and store application information supported by the financial card, store file information and store application data; the transmitter is configured to send the application information supported by the financial card to the host computer when the command is an application selecting command; the transmitter is further configured to send the file information to the host computer when the type of the command is a processing option acquiring command; the transmitter is further configured to send the application data corresponding to a file identification in an application data reading command to the host computer when the type of the command is the application data reading command; the processor is further configured to execute card behavior analysis and generate application cryptogram if the type of the command is an application cryptogram acquiring command; the transmitter is further configured to send the application cryptogram to the host computer; the processor is further configured to execute at least one of steps of: if the type of the received command is a verifying command and the verifying command is specifically a fingerprint verifying command, executing card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer; and storing user registration fingerprint, if a boot-up event is received, executing boot-up verification according to the user registration fingerprint and a fingerprint input by a user; waiting to receive the command from the host computer after the boot-up verification is successful. 12. The financial card of claim 11, the processor is further configured to: prompt the user to input transaction verifying information input by the user when the command is a transaction verifying command; execute transaction verification on the transaction verifying information input by the user after receiving the transaction verifying information input by the user; if the transaction verification is successful, return information that the transaction verification is successful to the host computer; otherwise, return information that the transaction verification is failed to the host computer and end transaction. 13. The financial card of claim 11, wherein the processor is further configured to: prompt the user to input a fingerprint when the boot-up event is received, verify the fingerprint input by the user according to the user registration fingerprint when the fingerprint input by the user is obtained; and wait to receive the command sent from the host computer when the boot-up verification is successful. 14. The financial card of claim 11, wherein the processor is further configured to: compute fingerprint feature according to the fingerprint input by the user when the boot-up event is received, determine whether the computed fingerprint feature is consistent with the fingerprint feature of the user registration fingerprint; if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; store the computed fingerprint when the boot-up verification is successful; and send the fingerprint feature to the host computer when the command is the verifying command and the verifying command is specifically the online fingerprint verifying command. 15. The financial card of claim 11, wherein the processor is further configured to: store a result of successful verification; and generate information that the offline fingerprint verifying is successful according to the result of successful card holder verification and send the information that the offline fingerprint verification is successful when the command is the verifying command and the verifying command is specifically the offline fingerprint verifying command. 16. The financial card of claim 11, wherein the processor is further configured to store the application information supported by the financial card, store file information of record information related to the online verification code, store the application data comprising the online verification code and store the user registration fingerprint when the boot-up verification is successful. 17. The financial card of claim 11, wherein the processor is further configured to: compute fingerprint feature according to the fingerprint input by the user, determine whether the computed fingerprint is consistent with the fingerprint feature of the user registration fingerprint when the boot-up event is received, if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; and store the application information supported by the financial card, store the file information of the record information related to the fingerprint feature, store the application data comprising the fingerprint feature, and store the user registered fingerprint when the boot-up verification is successful. 18. The financial card of claim 16, wherein the fingerprint verifying command is an offline fingerprint verifying command; the processor is further configured to wait for the user to input fingerprint, executes card holder verification on the fingerprint input by the user according to the user registration fingerprint when the fingerprint input by the user is obtained, when the command is the verifying command and the verifying command is specifically the offline fingerprint verifying command; if the card holder verification is successful, return information that the offline fingerprint verification is successful to the host computer; otherwise, return information that offline fingerprint verification is failed to the host computer. 19. The financial card of claim 11, wherein the processor is further configured to execute the boot-up verification according to the user registration fingerprint and the fingerprint input by the user when the financial card being powered up or the boot-up event from the user is received. 20. The financial card of claim 11, the transmitter is further configured to communicate data with the host computer via Bluetooth.
The present disclosure provides a financial card with function of fingerprint verification and a working method therefor, which belongs to information technology field The financial card with function of fingerprint verification includes: a waiting and receiving module (401), a determining module (402), a storing module (403), a first sending module (404), a second sending module (405), a third sending module (406), an application cryptogram module (407) and a fourth sending module (408). The financial card provided by the present disclosure further includes a cardholder verifying module and/or a boot-up verifying module The solution provided by the present disclosure improves security of the identity verification in an c- transaction and makes the e-transaction to be more convenient by using the fingerprint to execute identity verification.1. A working method for a financial card with function of fingerprint verification, comprising: Step S1, waiting, by the financial card, to receive a command from a host computer; Step S2, determining, by the financial card, a type of the command when the command from the host computer is received, if the financial card determines that the type of the command is an application selecting command, executing Step S3; if the financial card determines that the type of the command is a processing option acquiring command, executing Step S4; if the financial card determines that the type of the command is an application data reading command, executing Step S5; if the financial card determines that the type of the command is an application cryptogram acquiring command, executing Step S6; Step S3, sending, by the financial card, application information supported by itself to the host computer; Step S4, sending, by the financial card, file information to the host computer; Step S5, sending, by the financial card, application data corresponding to a file identification in the application data reading command to the host computer; Step S6, executing, by the financial card, card behavior analysis and generating application cryptogram, sending the application cryptogram to the host computer; and the method further comprises at least one of steps of: if the financial card determines that the type of the received command is a verifying command and the verifying command is specifically a fingerprint verifying command in the Step S2, executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer; and, before the Step S1, the method further comprises: if the financial card receives a boot-up event, executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user, executing the Step S1 if the boot-up verification is successful. 2. The method of claim 1, wherein the Step S2 further comprises: if the financial card determines that the received command is a transaction verifying command, executing Step S0; Step S0, prompting, by the financial card, the user to input transaction verifying information, executing transaction verification on the transaction verifying information input by the user after receiving the transaction verifying information input by the user, if the transaction verification is successful, returning information that the transaction verification is successful to the host computer; otherwise, returning information that the transaction verification is failed to the host computer and ending transaction. 3. The method of claim 1, wherein the executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user comprises: Step H1, prompting, by the financial card, the user to input a fingerprint; and Step H2, verifying, by the financial card, the fingerprint input by the user according to the self-stored user registration fingerprint when the financial card obtains the fingerprint input by the user. 4. The method of claim 1, wherein the executing, by the financial card, financial card boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user comprises: computing, by the financial card, fingerprint feature according to the fingerprint input by the user, determining whether the computed fingerprint feature is consistent with the fingerprint feature of the self-stored user registration fingerprint, if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; if the boot-up verification is successful, the method further comprises: storing, by the financial card, the computed fingerprint feature; wherein the fingerprint verifying command is specifically an online fingerprint verifying command; wherein the executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer comprises: sending, by the financial card, the stored fingerprint feature to the host computer. 5. The method of claim 1, wherein if the financial card executes boot-up verification according to self-stored user registration fingerprint and the fingerprint input by the user and the boot-up verification is successful, the method further comprises: storing, by the financial card, a result of successful verification; wherein the fingerprint verifying command is specifically an offline fingerprint verifying command; and wherein the executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer comprises: generating, by the financial card, information that offline fingerprint verification is successful according to the stored result of successful card holder verification and sending the information that the offline fingerprint verification is successful to the host computer. 6. The method of claim 1, wherein when before the Step S1, the method further comprises: if the financial card receives a boot-up event, executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user, and if the boot-up verification is successful: the file information sent by the financial card to the host computer in the Step S4 comprises record information related to an online verification code; the application data sent by the financial card to the host computer in the Step S5 comprises an online verification code corresponding to a recording information of an online verification code in the application data reading command. 7. The method of claim 1, wherein the executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user comprises: computing, by the financial card, fingerprint feature according to the fingerprint input by the user, determining whether the computed fingerprint feature is consistent with the fingerprint feature of the self-stored user registration fingerprint, if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; if the boot-up verification is successful, the method further comprises: storing, by the financial card, the computed fingerprint feature; wherein the file information sent by the financial card to the host computer in the Step S4 comprises recording information related to the fingerprint feature; wherein the application data sent by the financial card to the host computer in the Step S5 comprises fingerprint feature corresponding to the recording information of the fingerprint feature in the application data reading command. 8. The method of claim 6, wherein the fingerprint verifying command is specifically an offline fingerprint verifying command; wherein the executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer comprises: waiting for, by the financial card, the user to input fingerprint; executing card holder verification on the fingerprint input by the user according to the self-stored user registration fingerprint when the financial card obtains the fingerprint input by the user; if the card holder verification is successful, returning, by the financial card, the information that offline fingerprint verification is successful to the host computer; otherwise, returning, by the financial card, information that the offline fingerprint verification is failed to the host computer. 9. The method of claim 1, wherein the receiving, by the financial card, a boot-up event comprises: the financial card being powered up, or the financial card receives the boot-up event from a user. 10. The method of claim 1, wherein the financial card communicates data with the host computer via Bluetooth. 11. A financial card with function of fingerprint verification, comprising a processor, a transmitter and a memory storing instructions thereon, the processor when executing the instructions, being configured to: wait to receive a command from a host computer; determine a type of the command when the command from the host computer is received; and store application information supported by the financial card, store file information and store application data; the transmitter is configured to send the application information supported by the financial card to the host computer when the command is an application selecting command; the transmitter is further configured to send the file information to the host computer when the type of the command is a processing option acquiring command; the transmitter is further configured to send the application data corresponding to a file identification in an application data reading command to the host computer when the type of the command is the application data reading command; the processor is further configured to execute card behavior analysis and generate application cryptogram if the type of the command is an application cryptogram acquiring command; the transmitter is further configured to send the application cryptogram to the host computer; the processor is further configured to execute at least one of steps of: if the type of the received command is a verifying command and the verifying command is specifically a fingerprint verifying command, executing card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer; and storing user registration fingerprint, if a boot-up event is received, executing boot-up verification according to the user registration fingerprint and a fingerprint input by a user; waiting to receive the command from the host computer after the boot-up verification is successful. 12. The financial card of claim 11, the processor is further configured to: prompt the user to input transaction verifying information input by the user when the command is a transaction verifying command; execute transaction verification on the transaction verifying information input by the user after receiving the transaction verifying information input by the user; if the transaction verification is successful, return information that the transaction verification is successful to the host computer; otherwise, return information that the transaction verification is failed to the host computer and end transaction. 13. The financial card of claim 11, wherein the processor is further configured to: prompt the user to input a fingerprint when the boot-up event is received, verify the fingerprint input by the user according to the user registration fingerprint when the fingerprint input by the user is obtained; and wait to receive the command sent from the host computer when the boot-up verification is successful. 14. The financial card of claim 11, wherein the processor is further configured to: compute fingerprint feature according to the fingerprint input by the user when the boot-up event is received, determine whether the computed fingerprint feature is consistent with the fingerprint feature of the user registration fingerprint; if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; store the computed fingerprint when the boot-up verification is successful; and send the fingerprint feature to the host computer when the command is the verifying command and the verifying command is specifically the online fingerprint verifying command. 15. The financial card of claim 11, wherein the processor is further configured to: store a result of successful verification; and generate information that the offline fingerprint verifying is successful according to the result of successful card holder verification and send the information that the offline fingerprint verification is successful when the command is the verifying command and the verifying command is specifically the offline fingerprint verifying command. 16. The financial card of claim 11, wherein the processor is further configured to store the application information supported by the financial card, store file information of record information related to the online verification code, store the application data comprising the online verification code and store the user registration fingerprint when the boot-up verification is successful. 17. The financial card of claim 11, wherein the processor is further configured to: compute fingerprint feature according to the fingerprint input by the user, determine whether the computed fingerprint is consistent with the fingerprint feature of the user registration fingerprint when the boot-up event is received, if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; and store the application information supported by the financial card, store the file information of the record information related to the fingerprint feature, store the application data comprising the fingerprint feature, and store the user registered fingerprint when the boot-up verification is successful. 18. The financial card of claim 16, wherein the fingerprint verifying command is an offline fingerprint verifying command; the processor is further configured to wait for the user to input fingerprint, executes card holder verification on the fingerprint input by the user according to the user registration fingerprint when the fingerprint input by the user is obtained, when the command is the verifying command and the verifying command is specifically the offline fingerprint verifying command; if the card holder verification is successful, return information that the offline fingerprint verification is successful to the host computer; otherwise, return information that offline fingerprint verification is failed to the host computer. 19. The financial card of claim 11, wherein the processor is further configured to execute the boot-up verification according to the user registration fingerprint and the fingerprint input by the user when the financial card being powered up or the boot-up event from the user is received. 20. The financial card of claim 11, the transmitter is further configured to communicate data with the host computer via Bluetooth.
3,600
344,479
16,803,952
3,697
The present disclosure provides a financial card with function of fingerprint verification and a working method therefor, which belongs to information technology field The financial card with function of fingerprint verification includes: a waiting and receiving module (401), a determining module (402), a storing module (403), a first sending module (404), a second sending module (405), a third sending module (406), an application cryptogram module (407) and a fourth sending module (408). The financial card provided by the present disclosure further includes a cardholder verifying module and/or a boot-up verifying module The solution provided by the present disclosure improves security of the identity verification in an c- transaction and makes the e-transaction to be more convenient by using the fingerprint to execute identity verification.
1. A working method for a financial card with function of fingerprint verification, comprising: Step S1, waiting, by the financial card, to receive a command from a host computer; Step S2, determining, by the financial card, a type of the command when the command from the host computer is received, if the financial card determines that the type of the command is an application selecting command, executing Step S3; if the financial card determines that the type of the command is a processing option acquiring command, executing Step S4; if the financial card determines that the type of the command is an application data reading command, executing Step S5; if the financial card determines that the type of the command is an application cryptogram acquiring command, executing Step S6; Step S3, sending, by the financial card, application information supported by itself to the host computer; Step S4, sending, by the financial card, file information to the host computer; Step S5, sending, by the financial card, application data corresponding to a file identification in the application data reading command to the host computer; Step S6, executing, by the financial card, card behavior analysis and generating application cryptogram, sending the application cryptogram to the host computer; and the method further comprises at least one of steps of: if the financial card determines that the type of the received command is a verifying command and the verifying command is specifically a fingerprint verifying command in the Step S2, executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer; and, before the Step S1, the method further comprises: if the financial card receives a boot-up event, executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user, executing the Step S1 if the boot-up verification is successful. 2. The method of claim 1, wherein the Step S2 further comprises: if the financial card determines that the received command is a transaction verifying command, executing Step S0; Step S0, prompting, by the financial card, the user to input transaction verifying information, executing transaction verification on the transaction verifying information input by the user after receiving the transaction verifying information input by the user, if the transaction verification is successful, returning information that the transaction verification is successful to the host computer; otherwise, returning information that the transaction verification is failed to the host computer and ending transaction. 3. The method of claim 1, wherein the executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user comprises: Step H1, prompting, by the financial card, the user to input a fingerprint; and Step H2, verifying, by the financial card, the fingerprint input by the user according to the self-stored user registration fingerprint when the financial card obtains the fingerprint input by the user. 4. The method of claim 1, wherein the executing, by the financial card, financial card boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user comprises: computing, by the financial card, fingerprint feature according to the fingerprint input by the user, determining whether the computed fingerprint feature is consistent with the fingerprint feature of the self-stored user registration fingerprint, if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; if the boot-up verification is successful, the method further comprises: storing, by the financial card, the computed fingerprint feature; wherein the fingerprint verifying command is specifically an online fingerprint verifying command; wherein the executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer comprises: sending, by the financial card, the stored fingerprint feature to the host computer. 5. The method of claim 1, wherein if the financial card executes boot-up verification according to self-stored user registration fingerprint and the fingerprint input by the user and the boot-up verification is successful, the method further comprises: storing, by the financial card, a result of successful verification; wherein the fingerprint verifying command is specifically an offline fingerprint verifying command; and wherein the executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer comprises: generating, by the financial card, information that offline fingerprint verification is successful according to the stored result of successful card holder verification and sending the information that the offline fingerprint verification is successful to the host computer. 6. The method of claim 1, wherein when before the Step S1, the method further comprises: if the financial card receives a boot-up event, executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user, and if the boot-up verification is successful: the file information sent by the financial card to the host computer in the Step S4 comprises record information related to an online verification code; the application data sent by the financial card to the host computer in the Step S5 comprises an online verification code corresponding to a recording information of an online verification code in the application data reading command. 7. The method of claim 1, wherein the executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user comprises: computing, by the financial card, fingerprint feature according to the fingerprint input by the user, determining whether the computed fingerprint feature is consistent with the fingerprint feature of the self-stored user registration fingerprint, if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; if the boot-up verification is successful, the method further comprises: storing, by the financial card, the computed fingerprint feature; wherein the file information sent by the financial card to the host computer in the Step S4 comprises recording information related to the fingerprint feature; wherein the application data sent by the financial card to the host computer in the Step S5 comprises fingerprint feature corresponding to the recording information of the fingerprint feature in the application data reading command. 8. The method of claim 6, wherein the fingerprint verifying command is specifically an offline fingerprint verifying command; wherein the executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer comprises: waiting for, by the financial card, the user to input fingerprint; executing card holder verification on the fingerprint input by the user according to the self-stored user registration fingerprint when the financial card obtains the fingerprint input by the user; if the card holder verification is successful, returning, by the financial card, the information that offline fingerprint verification is successful to the host computer; otherwise, returning, by the financial card, information that the offline fingerprint verification is failed to the host computer. 9. The method of claim 1, wherein the receiving, by the financial card, a boot-up event comprises: the financial card being powered up, or the financial card receives the boot-up event from a user. 10. The method of claim 1, wherein the financial card communicates data with the host computer via Bluetooth. 11. A financial card with function of fingerprint verification, comprising a processor, a transmitter and a memory storing instructions thereon, the processor when executing the instructions, being configured to: wait to receive a command from a host computer; determine a type of the command when the command from the host computer is received; and store application information supported by the financial card, store file information and store application data; the transmitter is configured to send the application information supported by the financial card to the host computer when the command is an application selecting command; the transmitter is further configured to send the file information to the host computer when the type of the command is a processing option acquiring command; the transmitter is further configured to send the application data corresponding to a file identification in an application data reading command to the host computer when the type of the command is the application data reading command; the processor is further configured to execute card behavior analysis and generate application cryptogram if the type of the command is an application cryptogram acquiring command; the transmitter is further configured to send the application cryptogram to the host computer; the processor is further configured to execute at least one of steps of: if the type of the received command is a verifying command and the verifying command is specifically a fingerprint verifying command, executing card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer; and storing user registration fingerprint, if a boot-up event is received, executing boot-up verification according to the user registration fingerprint and a fingerprint input by a user; waiting to receive the command from the host computer after the boot-up verification is successful. 12. The financial card of claim 11, the processor is further configured to: prompt the user to input transaction verifying information input by the user when the command is a transaction verifying command; execute transaction verification on the transaction verifying information input by the user after receiving the transaction verifying information input by the user; if the transaction verification is successful, return information that the transaction verification is successful to the host computer; otherwise, return information that the transaction verification is failed to the host computer and end transaction. 13. The financial card of claim 11, wherein the processor is further configured to: prompt the user to input a fingerprint when the boot-up event is received, verify the fingerprint input by the user according to the user registration fingerprint when the fingerprint input by the user is obtained; and wait to receive the command sent from the host computer when the boot-up verification is successful. 14. The financial card of claim 11, wherein the processor is further configured to: compute fingerprint feature according to the fingerprint input by the user when the boot-up event is received, determine whether the computed fingerprint feature is consistent with the fingerprint feature of the user registration fingerprint; if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; store the computed fingerprint when the boot-up verification is successful; and send the fingerprint feature to the host computer when the command is the verifying command and the verifying command is specifically the online fingerprint verifying command. 15. The financial card of claim 11, wherein the processor is further configured to: store a result of successful verification; and generate information that the offline fingerprint verifying is successful according to the result of successful card holder verification and send the information that the offline fingerprint verification is successful when the command is the verifying command and the verifying command is specifically the offline fingerprint verifying command. 16. The financial card of claim 11, wherein the processor is further configured to store the application information supported by the financial card, store file information of record information related to the online verification code, store the application data comprising the online verification code and store the user registration fingerprint when the boot-up verification is successful. 17. The financial card of claim 11, wherein the processor is further configured to: compute fingerprint feature according to the fingerprint input by the user, determine whether the computed fingerprint is consistent with the fingerprint feature of the user registration fingerprint when the boot-up event is received, if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; and store the application information supported by the financial card, store the file information of the record information related to the fingerprint feature, store the application data comprising the fingerprint feature, and store the user registered fingerprint when the boot-up verification is successful. 18. The financial card of claim 16, wherein the fingerprint verifying command is an offline fingerprint verifying command; the processor is further configured to wait for the user to input fingerprint, executes card holder verification on the fingerprint input by the user according to the user registration fingerprint when the fingerprint input by the user is obtained, when the command is the verifying command and the verifying command is specifically the offline fingerprint verifying command; if the card holder verification is successful, return information that the offline fingerprint verification is successful to the host computer; otherwise, return information that offline fingerprint verification is failed to the host computer. 19. The financial card of claim 11, wherein the processor is further configured to execute the boot-up verification according to the user registration fingerprint and the fingerprint input by the user when the financial card being powered up or the boot-up event from the user is received. 20. The financial card of claim 11, the transmitter is further configured to communicate data with the host computer via Bluetooth.
The present disclosure provides a financial card with function of fingerprint verification and a working method therefor, which belongs to information technology field The financial card with function of fingerprint verification includes: a waiting and receiving module (401), a determining module (402), a storing module (403), a first sending module (404), a second sending module (405), a third sending module (406), an application cryptogram module (407) and a fourth sending module (408). The financial card provided by the present disclosure further includes a cardholder verifying module and/or a boot-up verifying module The solution provided by the present disclosure improves security of the identity verification in an c- transaction and makes the e-transaction to be more convenient by using the fingerprint to execute identity verification.1. A working method for a financial card with function of fingerprint verification, comprising: Step S1, waiting, by the financial card, to receive a command from a host computer; Step S2, determining, by the financial card, a type of the command when the command from the host computer is received, if the financial card determines that the type of the command is an application selecting command, executing Step S3; if the financial card determines that the type of the command is a processing option acquiring command, executing Step S4; if the financial card determines that the type of the command is an application data reading command, executing Step S5; if the financial card determines that the type of the command is an application cryptogram acquiring command, executing Step S6; Step S3, sending, by the financial card, application information supported by itself to the host computer; Step S4, sending, by the financial card, file information to the host computer; Step S5, sending, by the financial card, application data corresponding to a file identification in the application data reading command to the host computer; Step S6, executing, by the financial card, card behavior analysis and generating application cryptogram, sending the application cryptogram to the host computer; and the method further comprises at least one of steps of: if the financial card determines that the type of the received command is a verifying command and the verifying command is specifically a fingerprint verifying command in the Step S2, executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer; and, before the Step S1, the method further comprises: if the financial card receives a boot-up event, executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user, executing the Step S1 if the boot-up verification is successful. 2. The method of claim 1, wherein the Step S2 further comprises: if the financial card determines that the received command is a transaction verifying command, executing Step S0; Step S0, prompting, by the financial card, the user to input transaction verifying information, executing transaction verification on the transaction verifying information input by the user after receiving the transaction verifying information input by the user, if the transaction verification is successful, returning information that the transaction verification is successful to the host computer; otherwise, returning information that the transaction verification is failed to the host computer and ending transaction. 3. The method of claim 1, wherein the executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user comprises: Step H1, prompting, by the financial card, the user to input a fingerprint; and Step H2, verifying, by the financial card, the fingerprint input by the user according to the self-stored user registration fingerprint when the financial card obtains the fingerprint input by the user. 4. The method of claim 1, wherein the executing, by the financial card, financial card boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user comprises: computing, by the financial card, fingerprint feature according to the fingerprint input by the user, determining whether the computed fingerprint feature is consistent with the fingerprint feature of the self-stored user registration fingerprint, if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; if the boot-up verification is successful, the method further comprises: storing, by the financial card, the computed fingerprint feature; wherein the fingerprint verifying command is specifically an online fingerprint verifying command; wherein the executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer comprises: sending, by the financial card, the stored fingerprint feature to the host computer. 5. The method of claim 1, wherein if the financial card executes boot-up verification according to self-stored user registration fingerprint and the fingerprint input by the user and the boot-up verification is successful, the method further comprises: storing, by the financial card, a result of successful verification; wherein the fingerprint verifying command is specifically an offline fingerprint verifying command; and wherein the executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer comprises: generating, by the financial card, information that offline fingerprint verification is successful according to the stored result of successful card holder verification and sending the information that the offline fingerprint verification is successful to the host computer. 6. The method of claim 1, wherein when before the Step S1, the method further comprises: if the financial card receives a boot-up event, executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user, and if the boot-up verification is successful: the file information sent by the financial card to the host computer in the Step S4 comprises record information related to an online verification code; the application data sent by the financial card to the host computer in the Step S5 comprises an online verification code corresponding to a recording information of an online verification code in the application data reading command. 7. The method of claim 1, wherein the executing, by the financial card, boot-up verification according to a self-stored user registration fingerprint and a fingerprint input by a user comprises: computing, by the financial card, fingerprint feature according to the fingerprint input by the user, determining whether the computed fingerprint feature is consistent with the fingerprint feature of the self-stored user registration fingerprint, if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; if the boot-up verification is successful, the method further comprises: storing, by the financial card, the computed fingerprint feature; wherein the file information sent by the financial card to the host computer in the Step S4 comprises recording information related to the fingerprint feature; wherein the application data sent by the financial card to the host computer in the Step S5 comprises fingerprint feature corresponding to the recording information of the fingerprint feature in the application data reading command. 8. The method of claim 6, wherein the fingerprint verifying command is specifically an offline fingerprint verifying command; wherein the executing, by the financial card, card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer comprises: waiting for, by the financial card, the user to input fingerprint; executing card holder verification on the fingerprint input by the user according to the self-stored user registration fingerprint when the financial card obtains the fingerprint input by the user; if the card holder verification is successful, returning, by the financial card, the information that offline fingerprint verification is successful to the host computer; otherwise, returning, by the financial card, information that the offline fingerprint verification is failed to the host computer. 9. The method of claim 1, wherein the receiving, by the financial card, a boot-up event comprises: the financial card being powered up, or the financial card receives the boot-up event from a user. 10. The method of claim 1, wherein the financial card communicates data with the host computer via Bluetooth. 11. A financial card with function of fingerprint verification, comprising a processor, a transmitter and a memory storing instructions thereon, the processor when executing the instructions, being configured to: wait to receive a command from a host computer; determine a type of the command when the command from the host computer is received; and store application information supported by the financial card, store file information and store application data; the transmitter is configured to send the application information supported by the financial card to the host computer when the command is an application selecting command; the transmitter is further configured to send the file information to the host computer when the type of the command is a processing option acquiring command; the transmitter is further configured to send the application data corresponding to a file identification in an application data reading command to the host computer when the type of the command is the application data reading command; the processor is further configured to execute card behavior analysis and generate application cryptogram if the type of the command is an application cryptogram acquiring command; the transmitter is further configured to send the application cryptogram to the host computer; the processor is further configured to execute at least one of steps of: if the type of the received command is a verifying command and the verifying command is specifically a fingerprint verifying command, executing card holder verification according to a fingerprint of a user and returning information related to the card holder verification to the host computer; and storing user registration fingerprint, if a boot-up event is received, executing boot-up verification according to the user registration fingerprint and a fingerprint input by a user; waiting to receive the command from the host computer after the boot-up verification is successful. 12. The financial card of claim 11, the processor is further configured to: prompt the user to input transaction verifying information input by the user when the command is a transaction verifying command; execute transaction verification on the transaction verifying information input by the user after receiving the transaction verifying information input by the user; if the transaction verification is successful, return information that the transaction verification is successful to the host computer; otherwise, return information that the transaction verification is failed to the host computer and end transaction. 13. The financial card of claim 11, wherein the processor is further configured to: prompt the user to input a fingerprint when the boot-up event is received, verify the fingerprint input by the user according to the user registration fingerprint when the fingerprint input by the user is obtained; and wait to receive the command sent from the host computer when the boot-up verification is successful. 14. The financial card of claim 11, wherein the processor is further configured to: compute fingerprint feature according to the fingerprint input by the user when the boot-up event is received, determine whether the computed fingerprint feature is consistent with the fingerprint feature of the user registration fingerprint; if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; store the computed fingerprint when the boot-up verification is successful; and send the fingerprint feature to the host computer when the command is the verifying command and the verifying command is specifically the online fingerprint verifying command. 15. The financial card of claim 11, wherein the processor is further configured to: store a result of successful verification; and generate information that the offline fingerprint verifying is successful according to the result of successful card holder verification and send the information that the offline fingerprint verification is successful when the command is the verifying command and the verifying command is specifically the offline fingerprint verifying command. 16. The financial card of claim 11, wherein the processor is further configured to store the application information supported by the financial card, store file information of record information related to the online verification code, store the application data comprising the online verification code and store the user registration fingerprint when the boot-up verification is successful. 17. The financial card of claim 11, wherein the processor is further configured to: compute fingerprint feature according to the fingerprint input by the user, determine whether the computed fingerprint is consistent with the fingerprint feature of the user registration fingerprint when the boot-up event is received, if yes, the boot-up verification is successful; otherwise, the boot-up verification is failed; and store the application information supported by the financial card, store the file information of the record information related to the fingerprint feature, store the application data comprising the fingerprint feature, and store the user registered fingerprint when the boot-up verification is successful. 18. The financial card of claim 16, wherein the fingerprint verifying command is an offline fingerprint verifying command; the processor is further configured to wait for the user to input fingerprint, executes card holder verification on the fingerprint input by the user according to the user registration fingerprint when the fingerprint input by the user is obtained, when the command is the verifying command and the verifying command is specifically the offline fingerprint verifying command; if the card holder verification is successful, return information that the offline fingerprint verification is successful to the host computer; otherwise, return information that offline fingerprint verification is failed to the host computer. 19. The financial card of claim 11, wherein the processor is further configured to execute the boot-up verification according to the user registration fingerprint and the fingerprint input by the user when the financial card being powered up or the boot-up event from the user is received. 20. The financial card of claim 11, the transmitter is further configured to communicate data with the host computer via Bluetooth.
3,600
344,480
16,803,959
2,843
Improved performance of analog computers is obtained by utilizing a deliberate reduction in gain of the gain elements present in the analog computer. While a prior output of the circuit (if any) is present, the gain of the gain elements is reduced to a level that is low enough that the input signal cannot propagate through the circuit. The input signal is then changed to a new value, or set of values, while the gain of the gain elements remains reduced. Finally, the gain of the gain elements is increased to a level that is high enough to allow the input signal to propagate through the circuit, resulting in an output that is a solution to the problem represented by the analog computer.
1. A method of operating an analog computer, the analog computer comprising a plurality of gain elements configured to operate on an overall input signal to provide a solution to a predetermined problem, the gain of each of the plurality of gain elements being variable between a level sufficient to propagate a signal input to the element and a level insufficient to propagate the signal input to the element, the method comprising: reducing the gain of each of the plurality of gain elements to the level that is insufficient to propagate the signal input to the gain elements; changing the overall input signal while the gain of the gain elements is at the reduced level; and increasing the gain of each of the plurality of gain elements, at a time not before the changing of the input signal, to the level that is sufficient to propagate the signal input to the gain elements. 2. The method of claim 1 wherein the time of increasing the gain of the gain elements is after the changing of the overall input signal. 3. The method of claim 1 wherein the time of increasing the gain of the gain elements is simultaneous with the changing of the overall input signal. 4. A variable gain element for use in an analog computer, comprising: first and second transistors, each transistor having a gate, a source and a drain, the gate of the first transistor configured to receive an input signal and the gate of the second transistor connected to a reference point; first and second resistors, the first resistor connected to the drain of the first transistor and to one side of a voltage source, and the second resistor connected to the drain of the second transistor and to the voltage source; a current source connected to the sources of both the first and second transistors, configured to provide different levels of current in response to a control signal; an amplifier having inputs connected to the drains of the first and second transistors and the reference point, and an output providing the output of the gain element; and a control circuit configured to provide a control signal based upon a pre-selected condition. 5. The variable gain element of claim 4 wherein the first and second transistors are n-type metal oxide semiconductor field effect transistors. 6. The variable gain element of claim 4, wherein the control circuit further comprises: a switch; and control logic for placing the switch in a first position when there is a change in the input signal and a second position when there is a change in the output of the gain element; and wherein the current source is configured to provide current when the switch is in the first position and to provide no current when the switch is in the second position. 7. The variable gain element of claim 4, wherein the control circuit further comprises: a switch; and control logic for placing the switch in a first position and a second position at pre-selected intervals. 8. A variable gain element for use in an analog computer, comprising: a first amplifier configured to receive a signal at a first end and produce an amplified signal at a second end; a first resistive element having a first end configured to receive an input signal to the variable gain element, and a second end connected to the first end of the first amplifier; a second resistive element having a first end connected to the first end of the first amplifier and a second end connected to the second end of the first amplifier; a switch having a first end connected to the first end of the first amplifier, a second end connected to the second end of the first amplifier, and a switch port configured to receive a control signal, the switch being in either an open position or a closed position depending upon a control signal; control logic configured to provide the control signal to open or close the switch based upon a pre-selected condition; and a second amplifier configured to receive a signal at a first end and produce an amplified signal at a second end, the first end of the second amplifier connected to the second end of the first amplifier and the second end of the second amplifier configured to produce an output signal from the variable gain element. 9. The variable gain element of claim 8 wherein the pre-selected condition is to change the position of the switch when the input changes and again when an output signal appears on the output port of the second amplifier. 10. The variable gain element of claim 8 wherein the pre-selected condition is to change the position of the switch at pre-selected intervals. 11. An analog computer comprising: a plurality of gain elements configured to operate on an overall input signal to provide a solution to a predetermined problem, the gain of each gain element being variable between a level sufficient to propagate a signal input to the element and a level insufficient to propagate the input signal; a gain control means configured to switch the gain of the gain elements between the level sufficient to propagate the input signal and the level insufficient to propagate the input signal based upon a control signal; and a logic means configured to generate control signals causing the gain control means to switch the gain of the gain elements to the level insufficient to propagate the input signal before a change in the overall input signal, and to the level sufficient to propagate the input signal at a time not before the change in the input signal. 12. The analog computer of claim 11 wherein the gain elements contain transistors and the gain control means is a current source that reduces the current in the transistors below the point at which the transistors conduct current. 13. The analog computer of claim 11 wherein the gain elements include resistive feedback loops and the gain control means is a switch that shorts a feedback resistor and causes the gain of the gain element to drop to approximately zero.
Improved performance of analog computers is obtained by utilizing a deliberate reduction in gain of the gain elements present in the analog computer. While a prior output of the circuit (if any) is present, the gain of the gain elements is reduced to a level that is low enough that the input signal cannot propagate through the circuit. The input signal is then changed to a new value, or set of values, while the gain of the gain elements remains reduced. Finally, the gain of the gain elements is increased to a level that is high enough to allow the input signal to propagate through the circuit, resulting in an output that is a solution to the problem represented by the analog computer.1. A method of operating an analog computer, the analog computer comprising a plurality of gain elements configured to operate on an overall input signal to provide a solution to a predetermined problem, the gain of each of the plurality of gain elements being variable between a level sufficient to propagate a signal input to the element and a level insufficient to propagate the signal input to the element, the method comprising: reducing the gain of each of the plurality of gain elements to the level that is insufficient to propagate the signal input to the gain elements; changing the overall input signal while the gain of the gain elements is at the reduced level; and increasing the gain of each of the plurality of gain elements, at a time not before the changing of the input signal, to the level that is sufficient to propagate the signal input to the gain elements. 2. The method of claim 1 wherein the time of increasing the gain of the gain elements is after the changing of the overall input signal. 3. The method of claim 1 wherein the time of increasing the gain of the gain elements is simultaneous with the changing of the overall input signal. 4. A variable gain element for use in an analog computer, comprising: first and second transistors, each transistor having a gate, a source and a drain, the gate of the first transistor configured to receive an input signal and the gate of the second transistor connected to a reference point; first and second resistors, the first resistor connected to the drain of the first transistor and to one side of a voltage source, and the second resistor connected to the drain of the second transistor and to the voltage source; a current source connected to the sources of both the first and second transistors, configured to provide different levels of current in response to a control signal; an amplifier having inputs connected to the drains of the first and second transistors and the reference point, and an output providing the output of the gain element; and a control circuit configured to provide a control signal based upon a pre-selected condition. 5. The variable gain element of claim 4 wherein the first and second transistors are n-type metal oxide semiconductor field effect transistors. 6. The variable gain element of claim 4, wherein the control circuit further comprises: a switch; and control logic for placing the switch in a first position when there is a change in the input signal and a second position when there is a change in the output of the gain element; and wherein the current source is configured to provide current when the switch is in the first position and to provide no current when the switch is in the second position. 7. The variable gain element of claim 4, wherein the control circuit further comprises: a switch; and control logic for placing the switch in a first position and a second position at pre-selected intervals. 8. A variable gain element for use in an analog computer, comprising: a first amplifier configured to receive a signal at a first end and produce an amplified signal at a second end; a first resistive element having a first end configured to receive an input signal to the variable gain element, and a second end connected to the first end of the first amplifier; a second resistive element having a first end connected to the first end of the first amplifier and a second end connected to the second end of the first amplifier; a switch having a first end connected to the first end of the first amplifier, a second end connected to the second end of the first amplifier, and a switch port configured to receive a control signal, the switch being in either an open position or a closed position depending upon a control signal; control logic configured to provide the control signal to open or close the switch based upon a pre-selected condition; and a second amplifier configured to receive a signal at a first end and produce an amplified signal at a second end, the first end of the second amplifier connected to the second end of the first amplifier and the second end of the second amplifier configured to produce an output signal from the variable gain element. 9. The variable gain element of claim 8 wherein the pre-selected condition is to change the position of the switch when the input changes and again when an output signal appears on the output port of the second amplifier. 10. The variable gain element of claim 8 wherein the pre-selected condition is to change the position of the switch at pre-selected intervals. 11. An analog computer comprising: a plurality of gain elements configured to operate on an overall input signal to provide a solution to a predetermined problem, the gain of each gain element being variable between a level sufficient to propagate a signal input to the element and a level insufficient to propagate the input signal; a gain control means configured to switch the gain of the gain elements between the level sufficient to propagate the input signal and the level insufficient to propagate the input signal based upon a control signal; and a logic means configured to generate control signals causing the gain control means to switch the gain of the gain elements to the level insufficient to propagate the input signal before a change in the overall input signal, and to the level sufficient to propagate the input signal at a time not before the change in the input signal. 12. The analog computer of claim 11 wherein the gain elements contain transistors and the gain control means is a current source that reduces the current in the transistors below the point at which the transistors conduct current. 13. The analog computer of claim 11 wherein the gain elements include resistive feedback loops and the gain control means is a switch that shorts a feedback resistor and causes the gain of the gain element to drop to approximately zero.
2,800
344,481
29,725,758
2,915
Improved performance of analog computers is obtained by utilizing a deliberate reduction in gain of the gain elements present in the analog computer. While a prior output of the circuit (if any) is present, the gain of the gain elements is reduced to a level that is low enough that the input signal cannot propagate through the circuit. The input signal is then changed to a new value, or set of values, while the gain of the gain elements remains reduced. Finally, the gain of the gain elements is increased to a level that is high enough to allow the input signal to propagate through the circuit, resulting in an output that is a solution to the problem represented by the analog computer.
1. A method of operating an analog computer, the analog computer comprising a plurality of gain elements configured to operate on an overall input signal to provide a solution to a predetermined problem, the gain of each of the plurality of gain elements being variable between a level sufficient to propagate a signal input to the element and a level insufficient to propagate the signal input to the element, the method comprising: reducing the gain of each of the plurality of gain elements to the level that is insufficient to propagate the signal input to the gain elements; changing the overall input signal while the gain of the gain elements is at the reduced level; and increasing the gain of each of the plurality of gain elements, at a time not before the changing of the input signal, to the level that is sufficient to propagate the signal input to the gain elements. 2. The method of claim 1 wherein the time of increasing the gain of the gain elements is after the changing of the overall input signal. 3. The method of claim 1 wherein the time of increasing the gain of the gain elements is simultaneous with the changing of the overall input signal. 4. A variable gain element for use in an analog computer, comprising: first and second transistors, each transistor having a gate, a source and a drain, the gate of the first transistor configured to receive an input signal and the gate of the second transistor connected to a reference point; first and second resistors, the first resistor connected to the drain of the first transistor and to one side of a voltage source, and the second resistor connected to the drain of the second transistor and to the voltage source; a current source connected to the sources of both the first and second transistors, configured to provide different levels of current in response to a control signal; an amplifier having inputs connected to the drains of the first and second transistors and the reference point, and an output providing the output of the gain element; and a control circuit configured to provide a control signal based upon a pre-selected condition. 5. The variable gain element of claim 4 wherein the first and second transistors are n-type metal oxide semiconductor field effect transistors. 6. The variable gain element of claim 4, wherein the control circuit further comprises: a switch; and control logic for placing the switch in a first position when there is a change in the input signal and a second position when there is a change in the output of the gain element; and wherein the current source is configured to provide current when the switch is in the first position and to provide no current when the switch is in the second position. 7. The variable gain element of claim 4, wherein the control circuit further comprises: a switch; and control logic for placing the switch in a first position and a second position at pre-selected intervals. 8. A variable gain element for use in an analog computer, comprising: a first amplifier configured to receive a signal at a first end and produce an amplified signal at a second end; a first resistive element having a first end configured to receive an input signal to the variable gain element, and a second end connected to the first end of the first amplifier; a second resistive element having a first end connected to the first end of the first amplifier and a second end connected to the second end of the first amplifier; a switch having a first end connected to the first end of the first amplifier, a second end connected to the second end of the first amplifier, and a switch port configured to receive a control signal, the switch being in either an open position or a closed position depending upon a control signal; control logic configured to provide the control signal to open or close the switch based upon a pre-selected condition; and a second amplifier configured to receive a signal at a first end and produce an amplified signal at a second end, the first end of the second amplifier connected to the second end of the first amplifier and the second end of the second amplifier configured to produce an output signal from the variable gain element. 9. The variable gain element of claim 8 wherein the pre-selected condition is to change the position of the switch when the input changes and again when an output signal appears on the output port of the second amplifier. 10. The variable gain element of claim 8 wherein the pre-selected condition is to change the position of the switch at pre-selected intervals. 11. An analog computer comprising: a plurality of gain elements configured to operate on an overall input signal to provide a solution to a predetermined problem, the gain of each gain element being variable between a level sufficient to propagate a signal input to the element and a level insufficient to propagate the input signal; a gain control means configured to switch the gain of the gain elements between the level sufficient to propagate the input signal and the level insufficient to propagate the input signal based upon a control signal; and a logic means configured to generate control signals causing the gain control means to switch the gain of the gain elements to the level insufficient to propagate the input signal before a change in the overall input signal, and to the level sufficient to propagate the input signal at a time not before the change in the input signal. 12. The analog computer of claim 11 wherein the gain elements contain transistors and the gain control means is a current source that reduces the current in the transistors below the point at which the transistors conduct current. 13. The analog computer of claim 11 wherein the gain elements include resistive feedback loops and the gain control means is a switch that shorts a feedback resistor and causes the gain of the gain element to drop to approximately zero.
Improved performance of analog computers is obtained by utilizing a deliberate reduction in gain of the gain elements present in the analog computer. While a prior output of the circuit (if any) is present, the gain of the gain elements is reduced to a level that is low enough that the input signal cannot propagate through the circuit. The input signal is then changed to a new value, or set of values, while the gain of the gain elements remains reduced. Finally, the gain of the gain elements is increased to a level that is high enough to allow the input signal to propagate through the circuit, resulting in an output that is a solution to the problem represented by the analog computer.1. A method of operating an analog computer, the analog computer comprising a plurality of gain elements configured to operate on an overall input signal to provide a solution to a predetermined problem, the gain of each of the plurality of gain elements being variable between a level sufficient to propagate a signal input to the element and a level insufficient to propagate the signal input to the element, the method comprising: reducing the gain of each of the plurality of gain elements to the level that is insufficient to propagate the signal input to the gain elements; changing the overall input signal while the gain of the gain elements is at the reduced level; and increasing the gain of each of the plurality of gain elements, at a time not before the changing of the input signal, to the level that is sufficient to propagate the signal input to the gain elements. 2. The method of claim 1 wherein the time of increasing the gain of the gain elements is after the changing of the overall input signal. 3. The method of claim 1 wherein the time of increasing the gain of the gain elements is simultaneous with the changing of the overall input signal. 4. A variable gain element for use in an analog computer, comprising: first and second transistors, each transistor having a gate, a source and a drain, the gate of the first transistor configured to receive an input signal and the gate of the second transistor connected to a reference point; first and second resistors, the first resistor connected to the drain of the first transistor and to one side of a voltage source, and the second resistor connected to the drain of the second transistor and to the voltage source; a current source connected to the sources of both the first and second transistors, configured to provide different levels of current in response to a control signal; an amplifier having inputs connected to the drains of the first and second transistors and the reference point, and an output providing the output of the gain element; and a control circuit configured to provide a control signal based upon a pre-selected condition. 5. The variable gain element of claim 4 wherein the first and second transistors are n-type metal oxide semiconductor field effect transistors. 6. The variable gain element of claim 4, wherein the control circuit further comprises: a switch; and control logic for placing the switch in a first position when there is a change in the input signal and a second position when there is a change in the output of the gain element; and wherein the current source is configured to provide current when the switch is in the first position and to provide no current when the switch is in the second position. 7. The variable gain element of claim 4, wherein the control circuit further comprises: a switch; and control logic for placing the switch in a first position and a second position at pre-selected intervals. 8. A variable gain element for use in an analog computer, comprising: a first amplifier configured to receive a signal at a first end and produce an amplified signal at a second end; a first resistive element having a first end configured to receive an input signal to the variable gain element, and a second end connected to the first end of the first amplifier; a second resistive element having a first end connected to the first end of the first amplifier and a second end connected to the second end of the first amplifier; a switch having a first end connected to the first end of the first amplifier, a second end connected to the second end of the first amplifier, and a switch port configured to receive a control signal, the switch being in either an open position or a closed position depending upon a control signal; control logic configured to provide the control signal to open or close the switch based upon a pre-selected condition; and a second amplifier configured to receive a signal at a first end and produce an amplified signal at a second end, the first end of the second amplifier connected to the second end of the first amplifier and the second end of the second amplifier configured to produce an output signal from the variable gain element. 9. The variable gain element of claim 8 wherein the pre-selected condition is to change the position of the switch when the input changes and again when an output signal appears on the output port of the second amplifier. 10. The variable gain element of claim 8 wherein the pre-selected condition is to change the position of the switch at pre-selected intervals. 11. An analog computer comprising: a plurality of gain elements configured to operate on an overall input signal to provide a solution to a predetermined problem, the gain of each gain element being variable between a level sufficient to propagate a signal input to the element and a level insufficient to propagate the input signal; a gain control means configured to switch the gain of the gain elements between the level sufficient to propagate the input signal and the level insufficient to propagate the input signal based upon a control signal; and a logic means configured to generate control signals causing the gain control means to switch the gain of the gain elements to the level insufficient to propagate the input signal before a change in the overall input signal, and to the level sufficient to propagate the input signal at a time not before the change in the input signal. 12. The analog computer of claim 11 wherein the gain elements contain transistors and the gain control means is a current source that reduces the current in the transistors below the point at which the transistors conduct current. 13. The analog computer of claim 11 wherein the gain elements include resistive feedback loops and the gain control means is a switch that shorts a feedback resistor and causes the gain of the gain element to drop to approximately zero.
2,900
344,482
16,803,993
2,891
A semiconductor device and a method of forming a semiconductor device. The semiconductor device includes a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate, a first doped epitaxial semiconductor material grown on the first raised feature, a first metal contact on the first doped epitaxial semiconductor material, a first metal nitride on the first metal contact, and a first ruthenium (Ru) metal plug on the first metal nitride. The device further includes a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate, a second doped epitaxial semiconductor material grown on the second raised feature, a second metal contact on the second doped epitaxial semiconductor material, a second metal nitride on the second metal contact, and a second ruthenium (Ru) metal plug on the second metal nitride.
1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature; a first n-type metal contact on the first n-type doped epitaxial semiconductor material; a first metal nitride on the first n-type metal contact; a first ruthenium (Ru) metal plug on the first metal nitride; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature; a second p-type metal contact on the second p-type doped epitaxial semiconductor material; a second metal nitride on the second p-type metal contact; and a second ruthenium (Ru) metal plug on the second metal nitride. 2. The device of claim 1, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As. 3. The device of claim 2, wherein the first n-type metal contact contains titanium (Ti) metal. 4. The device of claim 2, wherein the first metal nitride contains TaN or TiN. 5. The device of claim 1, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B. 6. The device of claim 5, wherein the second p-type metal contact contains Ru or RuSix. 7. The device of claim 5, wherein the second metal nitride contains TaN or TiN. 8. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature; depositing a first n-type metal contact containing titanium (Ti) metal on the first n-type doped epitaxial semiconductor material; depositing a first metal nitride on the first n-type metal contact; depositing a first ruthenium (Ru) metal plug on the first metal nitride; providing second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature; depositing a second p-type metal contact containing a Ru metal or ruthenium silicide (RuSix) on the second p-type doped epitaxial semiconductor material; depositing a second metal nitride on the second p-type metal contact; and depositing a second ruthenium (Ru) metal plug on the second metal nitride. 9. The method of claim 8, wherein the first metal nitride includes TaN or TiN. 10. The method of claim 8, wherein the second metal nitride includes TaN or TiN. 11. The method of claim 8, wherein the first n-type doped epitaxial semiconductor material includes SiP or SiAs. 12. The method of claim 8, wherein the second p-type doped epitaxial semiconductor material includes SiGeB. 13. A method of forming a semiconductor device, the method comprising: providing a patterned substrate containing a first etched feature connecting to a first n-type doped epitaxial semiconductor material at the bottom of the first etched feature and a second etched feature connecting to a second p-type doped epitaxial material at the bottom of the second etched feature; conformally depositing first n-type metal contact containing titanium (Ti) metal layer in the first and second etched features, including on the first and second p-type doped epitaxial materials; non-conformally depositing a first metal nitride on the first n-type metal contact in the first and second etched features; selectively forming a blocking layer on the first etched feature but not on the second etched feature; removing the metal nitride from the second etched feature; removing the blocking layer from the first etched feature; removing the first n-type metal contact from the second etched feature while retaining the first n-type metal contact on the first n-type doped epitaxial material underneath the metal nitride at the bottom of the first etched feature; non-conformally depositing a second p-type metal contactin the first and second etched features; annealing the patterned substrate to at least partly form a metal silicide at the bottom of the second etched feature; depositing a second metal nitride on the metal silicide; and filling the first and second recessed features with Ru metal plugs. 14. The method of claim 13, wherein the first metal nitride includes TaN or TiN. 15. The method of claim 13, wherein the second metal nitride includes TaN or TiN. 16. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material includes SiP or SiAs. 17. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material includes SiGeB. 18. The method of claim 13, wherein the second p-type metal contact contains Ru or RuSix.
A semiconductor device and a method of forming a semiconductor device. The semiconductor device includes a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate, a first doped epitaxial semiconductor material grown on the first raised feature, a first metal contact on the first doped epitaxial semiconductor material, a first metal nitride on the first metal contact, and a first ruthenium (Ru) metal plug on the first metal nitride. The device further includes a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate, a second doped epitaxial semiconductor material grown on the second raised feature, a second metal contact on the second doped epitaxial semiconductor material, a second metal nitride on the second metal contact, and a second ruthenium (Ru) metal plug on the second metal nitride.1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature; a first n-type metal contact on the first n-type doped epitaxial semiconductor material; a first metal nitride on the first n-type metal contact; a first ruthenium (Ru) metal plug on the first metal nitride; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature; a second p-type metal contact on the second p-type doped epitaxial semiconductor material; a second metal nitride on the second p-type metal contact; and a second ruthenium (Ru) metal plug on the second metal nitride. 2. The device of claim 1, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As. 3. The device of claim 2, wherein the first n-type metal contact contains titanium (Ti) metal. 4. The device of claim 2, wherein the first metal nitride contains TaN or TiN. 5. The device of claim 1, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B. 6. The device of claim 5, wherein the second p-type metal contact contains Ru or RuSix. 7. The device of claim 5, wherein the second metal nitride contains TaN or TiN. 8. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature; depositing a first n-type metal contact containing titanium (Ti) metal on the first n-type doped epitaxial semiconductor material; depositing a first metal nitride on the first n-type metal contact; depositing a first ruthenium (Ru) metal plug on the first metal nitride; providing second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature; depositing a second p-type metal contact containing a Ru metal or ruthenium silicide (RuSix) on the second p-type doped epitaxial semiconductor material; depositing a second metal nitride on the second p-type metal contact; and depositing a second ruthenium (Ru) metal plug on the second metal nitride. 9. The method of claim 8, wherein the first metal nitride includes TaN or TiN. 10. The method of claim 8, wherein the second metal nitride includes TaN or TiN. 11. The method of claim 8, wherein the first n-type doped epitaxial semiconductor material includes SiP or SiAs. 12. The method of claim 8, wherein the second p-type doped epitaxial semiconductor material includes SiGeB. 13. A method of forming a semiconductor device, the method comprising: providing a patterned substrate containing a first etched feature connecting to a first n-type doped epitaxial semiconductor material at the bottom of the first etched feature and a second etched feature connecting to a second p-type doped epitaxial material at the bottom of the second etched feature; conformally depositing first n-type metal contact containing titanium (Ti) metal layer in the first and second etched features, including on the first and second p-type doped epitaxial materials; non-conformally depositing a first metal nitride on the first n-type metal contact in the first and second etched features; selectively forming a blocking layer on the first etched feature but not on the second etched feature; removing the metal nitride from the second etched feature; removing the blocking layer from the first etched feature; removing the first n-type metal contact from the second etched feature while retaining the first n-type metal contact on the first n-type doped epitaxial material underneath the metal nitride at the bottom of the first etched feature; non-conformally depositing a second p-type metal contactin the first and second etched features; annealing the patterned substrate to at least partly form a metal silicide at the bottom of the second etched feature; depositing a second metal nitride on the metal silicide; and filling the first and second recessed features with Ru metal plugs. 14. The method of claim 13, wherein the first metal nitride includes TaN or TiN. 15. The method of claim 13, wherein the second metal nitride includes TaN or TiN. 16. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material includes SiP or SiAs. 17. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material includes SiGeB. 18. The method of claim 13, wherein the second p-type metal contact contains Ru or RuSix.
2,800
344,483
29,725,763
2,914
A semiconductor device and a method of forming a semiconductor device. The semiconductor device includes a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate, a first doped epitaxial semiconductor material grown on the first raised feature, a first metal contact on the first doped epitaxial semiconductor material, a first metal nitride on the first metal contact, and a first ruthenium (Ru) metal plug on the first metal nitride. The device further includes a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate, a second doped epitaxial semiconductor material grown on the second raised feature, a second metal contact on the second doped epitaxial semiconductor material, a second metal nitride on the second metal contact, and a second ruthenium (Ru) metal plug on the second metal nitride.
1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature; a first n-type metal contact on the first n-type doped epitaxial semiconductor material; a first metal nitride on the first n-type metal contact; a first ruthenium (Ru) metal plug on the first metal nitride; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature; a second p-type metal contact on the second p-type doped epitaxial semiconductor material; a second metal nitride on the second p-type metal contact; and a second ruthenium (Ru) metal plug on the second metal nitride. 2. The device of claim 1, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As. 3. The device of claim 2, wherein the first n-type metal contact contains titanium (Ti) metal. 4. The device of claim 2, wherein the first metal nitride contains TaN or TiN. 5. The device of claim 1, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B. 6. The device of claim 5, wherein the second p-type metal contact contains Ru or RuSix. 7. The device of claim 5, wherein the second metal nitride contains TaN or TiN. 8. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature; depositing a first n-type metal contact containing titanium (Ti) metal on the first n-type doped epitaxial semiconductor material; depositing a first metal nitride on the first n-type metal contact; depositing a first ruthenium (Ru) metal plug on the first metal nitride; providing second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature; depositing a second p-type metal contact containing a Ru metal or ruthenium silicide (RuSix) on the second p-type doped epitaxial semiconductor material; depositing a second metal nitride on the second p-type metal contact; and depositing a second ruthenium (Ru) metal plug on the second metal nitride. 9. The method of claim 8, wherein the first metal nitride includes TaN or TiN. 10. The method of claim 8, wherein the second metal nitride includes TaN or TiN. 11. The method of claim 8, wherein the first n-type doped epitaxial semiconductor material includes SiP or SiAs. 12. The method of claim 8, wherein the second p-type doped epitaxial semiconductor material includes SiGeB. 13. A method of forming a semiconductor device, the method comprising: providing a patterned substrate containing a first etched feature connecting to a first n-type doped epitaxial semiconductor material at the bottom of the first etched feature and a second etched feature connecting to a second p-type doped epitaxial material at the bottom of the second etched feature; conformally depositing first n-type metal contact containing titanium (Ti) metal layer in the first and second etched features, including on the first and second p-type doped epitaxial materials; non-conformally depositing a first metal nitride on the first n-type metal contact in the first and second etched features; selectively forming a blocking layer on the first etched feature but not on the second etched feature; removing the metal nitride from the second etched feature; removing the blocking layer from the first etched feature; removing the first n-type metal contact from the second etched feature while retaining the first n-type metal contact on the first n-type doped epitaxial material underneath the metal nitride at the bottom of the first etched feature; non-conformally depositing a second p-type metal contactin the first and second etched features; annealing the patterned substrate to at least partly form a metal silicide at the bottom of the second etched feature; depositing a second metal nitride on the metal silicide; and filling the first and second recessed features with Ru metal plugs. 14. The method of claim 13, wherein the first metal nitride includes TaN or TiN. 15. The method of claim 13, wherein the second metal nitride includes TaN or TiN. 16. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material includes SiP or SiAs. 17. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material includes SiGeB. 18. The method of claim 13, wherein the second p-type metal contact contains Ru or RuSix.
A semiconductor device and a method of forming a semiconductor device. The semiconductor device includes a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate, a first doped epitaxial semiconductor material grown on the first raised feature, a first metal contact on the first doped epitaxial semiconductor material, a first metal nitride on the first metal contact, and a first ruthenium (Ru) metal plug on the first metal nitride. The device further includes a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate, a second doped epitaxial semiconductor material grown on the second raised feature, a second metal contact on the second doped epitaxial semiconductor material, a second metal nitride on the second metal contact, and a second ruthenium (Ru) metal plug on the second metal nitride.1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature; a first n-type metal contact on the first n-type doped epitaxial semiconductor material; a first metal nitride on the first n-type metal contact; a first ruthenium (Ru) metal plug on the first metal nitride; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature; a second p-type metal contact on the second p-type doped epitaxial semiconductor material; a second metal nitride on the second p-type metal contact; and a second ruthenium (Ru) metal plug on the second metal nitride. 2. The device of claim 1, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As. 3. The device of claim 2, wherein the first n-type metal contact contains titanium (Ti) metal. 4. The device of claim 2, wherein the first metal nitride contains TaN or TiN. 5. The device of claim 1, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B. 6. The device of claim 5, wherein the second p-type metal contact contains Ru or RuSix. 7. The device of claim 5, wherein the second metal nitride contains TaN or TiN. 8. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature; depositing a first n-type metal contact containing titanium (Ti) metal on the first n-type doped epitaxial semiconductor material; depositing a first metal nitride on the first n-type metal contact; depositing a first ruthenium (Ru) metal plug on the first metal nitride; providing second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature; depositing a second p-type metal contact containing a Ru metal or ruthenium silicide (RuSix) on the second p-type doped epitaxial semiconductor material; depositing a second metal nitride on the second p-type metal contact; and depositing a second ruthenium (Ru) metal plug on the second metal nitride. 9. The method of claim 8, wherein the first metal nitride includes TaN or TiN. 10. The method of claim 8, wherein the second metal nitride includes TaN or TiN. 11. The method of claim 8, wherein the first n-type doped epitaxial semiconductor material includes SiP or SiAs. 12. The method of claim 8, wherein the second p-type doped epitaxial semiconductor material includes SiGeB. 13. A method of forming a semiconductor device, the method comprising: providing a patterned substrate containing a first etched feature connecting to a first n-type doped epitaxial semiconductor material at the bottom of the first etched feature and a second etched feature connecting to a second p-type doped epitaxial material at the bottom of the second etched feature; conformally depositing first n-type metal contact containing titanium (Ti) metal layer in the first and second etched features, including on the first and second p-type doped epitaxial materials; non-conformally depositing a first metal nitride on the first n-type metal contact in the first and second etched features; selectively forming a blocking layer on the first etched feature but not on the second etched feature; removing the metal nitride from the second etched feature; removing the blocking layer from the first etched feature; removing the first n-type metal contact from the second etched feature while retaining the first n-type metal contact on the first n-type doped epitaxial material underneath the metal nitride at the bottom of the first etched feature; non-conformally depositing a second p-type metal contactin the first and second etched features; annealing the patterned substrate to at least partly form a metal silicide at the bottom of the second etched feature; depositing a second metal nitride on the metal silicide; and filling the first and second recessed features with Ru metal plugs. 14. The method of claim 13, wherein the first metal nitride includes TaN or TiN. 15. The method of claim 13, wherein the second metal nitride includes TaN or TiN. 16. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material includes SiP or SiAs. 17. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material includes SiGeB. 18. The method of claim 13, wherein the second p-type metal contact contains Ru or RuSix.
2,900
344,484
29,725,756
2,921
A semiconductor device and a method of forming a semiconductor device. The semiconductor device includes a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate, a first doped epitaxial semiconductor material grown on the first raised feature, a first metal contact on the first doped epitaxial semiconductor material, a first metal nitride on the first metal contact, and a first ruthenium (Ru) metal plug on the first metal nitride. The device further includes a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate, a second doped epitaxial semiconductor material grown on the second raised feature, a second metal contact on the second doped epitaxial semiconductor material, a second metal nitride on the second metal contact, and a second ruthenium (Ru) metal plug on the second metal nitride.
1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature; a first n-type metal contact on the first n-type doped epitaxial semiconductor material; a first metal nitride on the first n-type metal contact; a first ruthenium (Ru) metal plug on the first metal nitride; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature; a second p-type metal contact on the second p-type doped epitaxial semiconductor material; a second metal nitride on the second p-type metal contact; and a second ruthenium (Ru) metal plug on the second metal nitride. 2. The device of claim 1, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As. 3. The device of claim 2, wherein the first n-type metal contact contains titanium (Ti) metal. 4. The device of claim 2, wherein the first metal nitride contains TaN or TiN. 5. The device of claim 1, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B. 6. The device of claim 5, wherein the second p-type metal contact contains Ru or RuSix. 7. The device of claim 5, wherein the second metal nitride contains TaN or TiN. 8. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature; depositing a first n-type metal contact containing titanium (Ti) metal on the first n-type doped epitaxial semiconductor material; depositing a first metal nitride on the first n-type metal contact; depositing a first ruthenium (Ru) metal plug on the first metal nitride; providing second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature; depositing a second p-type metal contact containing a Ru metal or ruthenium silicide (RuSix) on the second p-type doped epitaxial semiconductor material; depositing a second metal nitride on the second p-type metal contact; and depositing a second ruthenium (Ru) metal plug on the second metal nitride. 9. The method of claim 8, wherein the first metal nitride includes TaN or TiN. 10. The method of claim 8, wherein the second metal nitride includes TaN or TiN. 11. The method of claim 8, wherein the first n-type doped epitaxial semiconductor material includes SiP or SiAs. 12. The method of claim 8, wherein the second p-type doped epitaxial semiconductor material includes SiGeB. 13. A method of forming a semiconductor device, the method comprising: providing a patterned substrate containing a first etched feature connecting to a first n-type doped epitaxial semiconductor material at the bottom of the first etched feature and a second etched feature connecting to a second p-type doped epitaxial material at the bottom of the second etched feature; conformally depositing first n-type metal contact containing titanium (Ti) metal layer in the first and second etched features, including on the first and second p-type doped epitaxial materials; non-conformally depositing a first metal nitride on the first n-type metal contact in the first and second etched features; selectively forming a blocking layer on the first etched feature but not on the second etched feature; removing the metal nitride from the second etched feature; removing the blocking layer from the first etched feature; removing the first n-type metal contact from the second etched feature while retaining the first n-type metal contact on the first n-type doped epitaxial material underneath the metal nitride at the bottom of the first etched feature; non-conformally depositing a second p-type metal contactin the first and second etched features; annealing the patterned substrate to at least partly form a metal silicide at the bottom of the second etched feature; depositing a second metal nitride on the metal silicide; and filling the first and second recessed features with Ru metal plugs. 14. The method of claim 13, wherein the first metal nitride includes TaN or TiN. 15. The method of claim 13, wherein the second metal nitride includes TaN or TiN. 16. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material includes SiP or SiAs. 17. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material includes SiGeB. 18. The method of claim 13, wherein the second p-type metal contact contains Ru or RuSix.
A semiconductor device and a method of forming a semiconductor device. The semiconductor device includes a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate, a first doped epitaxial semiconductor material grown on the first raised feature, a first metal contact on the first doped epitaxial semiconductor material, a first metal nitride on the first metal contact, and a first ruthenium (Ru) metal plug on the first metal nitride. The device further includes a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate, a second doped epitaxial semiconductor material grown on the second raised feature, a second metal contact on the second doped epitaxial semiconductor material, a second metal nitride on the second metal contact, and a second ruthenium (Ru) metal plug on the second metal nitride.1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature; a first n-type metal contact on the first n-type doped epitaxial semiconductor material; a first metal nitride on the first n-type metal contact; a first ruthenium (Ru) metal plug on the first metal nitride; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature; a second p-type metal contact on the second p-type doped epitaxial semiconductor material; a second metal nitride on the second p-type metal contact; and a second ruthenium (Ru) metal plug on the second metal nitride. 2. The device of claim 1, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As. 3. The device of claim 2, wherein the first n-type metal contact contains titanium (Ti) metal. 4. The device of claim 2, wherein the first metal nitride contains TaN or TiN. 5. The device of claim 1, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B. 6. The device of claim 5, wherein the second p-type metal contact contains Ru or RuSix. 7. The device of claim 5, wherein the second metal nitride contains TaN or TiN. 8. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature; depositing a first n-type metal contact containing titanium (Ti) metal on the first n-type doped epitaxial semiconductor material; depositing a first metal nitride on the first n-type metal contact; depositing a first ruthenium (Ru) metal plug on the first metal nitride; providing second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature; depositing a second p-type metal contact containing a Ru metal or ruthenium silicide (RuSix) on the second p-type doped epitaxial semiconductor material; depositing a second metal nitride on the second p-type metal contact; and depositing a second ruthenium (Ru) metal plug on the second metal nitride. 9. The method of claim 8, wherein the first metal nitride includes TaN or TiN. 10. The method of claim 8, wherein the second metal nitride includes TaN or TiN. 11. The method of claim 8, wherein the first n-type doped epitaxial semiconductor material includes SiP or SiAs. 12. The method of claim 8, wherein the second p-type doped epitaxial semiconductor material includes SiGeB. 13. A method of forming a semiconductor device, the method comprising: providing a patterned substrate containing a first etched feature connecting to a first n-type doped epitaxial semiconductor material at the bottom of the first etched feature and a second etched feature connecting to a second p-type doped epitaxial material at the bottom of the second etched feature; conformally depositing first n-type metal contact containing titanium (Ti) metal layer in the first and second etched features, including on the first and second p-type doped epitaxial materials; non-conformally depositing a first metal nitride on the first n-type metal contact in the first and second etched features; selectively forming a blocking layer on the first etched feature but not on the second etched feature; removing the metal nitride from the second etched feature; removing the blocking layer from the first etched feature; removing the first n-type metal contact from the second etched feature while retaining the first n-type metal contact on the first n-type doped epitaxial material underneath the metal nitride at the bottom of the first etched feature; non-conformally depositing a second p-type metal contactin the first and second etched features; annealing the patterned substrate to at least partly form a metal silicide at the bottom of the second etched feature; depositing a second metal nitride on the metal silicide; and filling the first and second recessed features with Ru metal plugs. 14. The method of claim 13, wherein the first metal nitride includes TaN or TiN. 15. The method of claim 13, wherein the second metal nitride includes TaN or TiN. 16. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material includes SiP or SiAs. 17. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material includes SiGeB. 18. The method of claim 13, wherein the second p-type metal contact contains Ru or RuSix.
2,900
344,485
16,803,987
2,816
A semiconductor device includes a first raised feature in a NFET region on a substrate, a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface, a first contact metal on the first downward facing surface, and a second contact metal on the first upward facing surface. The device further includes a second raised feature in a PFET region on the substrate, a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface, a third contact metal on the second downward facing surface, and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal.
1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; a first contact metal on the first downward facing surface; a second contact metal on the first upward facing surface; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; a third contact metal on the second downward facing surface; and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 2. The device of claim 1, wherein the first contact metal contains the same metal as the third contact metal. 3. The device of claim 2, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 4. The device of claim 2, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 5. The device of claim 1, wherein the first contact metal is different from the third contact metal. 6. The device of claim 5, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 7. The device of claim 5, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 8. The device of claim 1, wherein the first and second raised features are Si fins that extend through a shallow trench isolation (STI) layer. 9. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; forming a first contact metal on the first downward facing surface; forming a second contact metal on the first upward facing surface; providing a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; forming a third contact metal on the second downward facing surface; and forming a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 10. The method of claim 9, wherein the first contact metal contains the same metal as the third contact metal. 11. The method of claim 10, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 12. The method of claim 10, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 13. The method of claim 10, wherein the first contact metal is different from the third contact metal. 14. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 15. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 16. The method of claim 9, wherein the first and second raised features are fins that extend through a shallow trench isolation (STI) layer. 17. The method of claim 9, wherein forming the first contact metal on the first downward facing surface and forming the second contact metal on the first upward facing surface includes: conformally depositing the first contact metal on the first upward facing surface and on the first downward facing surface; removing the first contact metal from the first upward facing surface; and depositing the second contact metal on the first upward facing surface. 18. The method of claim 9, wherein forming the third contact metal on the second downward facing surface and forming the fourth contact metal on the second upward facing surface includes: conformally depositing the third contact metal on the second upward and downward facing surfaces; removing the third contact metal from the second upward facing surface; and depositing the fourth contact metal on the second upward facing surface.
A semiconductor device includes a first raised feature in a NFET region on a substrate, a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface, a first contact metal on the first downward facing surface, and a second contact metal on the first upward facing surface. The device further includes a second raised feature in a PFET region on the substrate, a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface, a third contact metal on the second downward facing surface, and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal.1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; a first contact metal on the first downward facing surface; a second contact metal on the first upward facing surface; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; a third contact metal on the second downward facing surface; and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 2. The device of claim 1, wherein the first contact metal contains the same metal as the third contact metal. 3. The device of claim 2, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 4. The device of claim 2, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 5. The device of claim 1, wherein the first contact metal is different from the third contact metal. 6. The device of claim 5, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 7. The device of claim 5, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 8. The device of claim 1, wherein the first and second raised features are Si fins that extend through a shallow trench isolation (STI) layer. 9. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; forming a first contact metal on the first downward facing surface; forming a second contact metal on the first upward facing surface; providing a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; forming a third contact metal on the second downward facing surface; and forming a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 10. The method of claim 9, wherein the first contact metal contains the same metal as the third contact metal. 11. The method of claim 10, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 12. The method of claim 10, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 13. The method of claim 10, wherein the first contact metal is different from the third contact metal. 14. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 15. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 16. The method of claim 9, wherein the first and second raised features are fins that extend through a shallow trench isolation (STI) layer. 17. The method of claim 9, wherein forming the first contact metal on the first downward facing surface and forming the second contact metal on the first upward facing surface includes: conformally depositing the first contact metal on the first upward facing surface and on the first downward facing surface; removing the first contact metal from the first upward facing surface; and depositing the second contact metal on the first upward facing surface. 18. The method of claim 9, wherein forming the third contact metal on the second downward facing surface and forming the fourth contact metal on the second upward facing surface includes: conformally depositing the third contact metal on the second upward and downward facing surfaces; removing the third contact metal from the second upward facing surface; and depositing the fourth contact metal on the second upward facing surface.
2,800
344,486
29,725,760
2,816
A semiconductor device includes a first raised feature in a NFET region on a substrate, a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface, a first contact metal on the first downward facing surface, and a second contact metal on the first upward facing surface. The device further includes a second raised feature in a PFET region on the substrate, a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface, a third contact metal on the second downward facing surface, and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal.
1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; a first contact metal on the first downward facing surface; a second contact metal on the first upward facing surface; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; a third contact metal on the second downward facing surface; and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 2. The device of claim 1, wherein the first contact metal contains the same metal as the third contact metal. 3. The device of claim 2, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 4. The device of claim 2, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 5. The device of claim 1, wherein the first contact metal is different from the third contact metal. 6. The device of claim 5, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 7. The device of claim 5, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 8. The device of claim 1, wherein the first and second raised features are Si fins that extend through a shallow trench isolation (STI) layer. 9. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; forming a first contact metal on the first downward facing surface; forming a second contact metal on the first upward facing surface; providing a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; forming a third contact metal on the second downward facing surface; and forming a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 10. The method of claim 9, wherein the first contact metal contains the same metal as the third contact metal. 11. The method of claim 10, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 12. The method of claim 10, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 13. The method of claim 10, wherein the first contact metal is different from the third contact metal. 14. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 15. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 16. The method of claim 9, wherein the first and second raised features are fins that extend through a shallow trench isolation (STI) layer. 17. The method of claim 9, wherein forming the first contact metal on the first downward facing surface and forming the second contact metal on the first upward facing surface includes: conformally depositing the first contact metal on the first upward facing surface and on the first downward facing surface; removing the first contact metal from the first upward facing surface; and depositing the second contact metal on the first upward facing surface. 18. The method of claim 9, wherein forming the third contact metal on the second downward facing surface and forming the fourth contact metal on the second upward facing surface includes: conformally depositing the third contact metal on the second upward and downward facing surfaces; removing the third contact metal from the second upward facing surface; and depositing the fourth contact metal on the second upward facing surface.
A semiconductor device includes a first raised feature in a NFET region on a substrate, a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface, a first contact metal on the first downward facing surface, and a second contact metal on the first upward facing surface. The device further includes a second raised feature in a PFET region on the substrate, a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface, a third contact metal on the second downward facing surface, and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal.1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; a first contact metal on the first downward facing surface; a second contact metal on the first upward facing surface; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; a third contact metal on the second downward facing surface; and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 2. The device of claim 1, wherein the first contact metal contains the same metal as the third contact metal. 3. The device of claim 2, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 4. The device of claim 2, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 5. The device of claim 1, wherein the first contact metal is different from the third contact metal. 6. The device of claim 5, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 7. The device of claim 5, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 8. The device of claim 1, wherein the first and second raised features are Si fins that extend through a shallow trench isolation (STI) layer. 9. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; forming a first contact metal on the first downward facing surface; forming a second contact metal on the first upward facing surface; providing a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; forming a third contact metal on the second downward facing surface; and forming a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 10. The method of claim 9, wherein the first contact metal contains the same metal as the third contact metal. 11. The method of claim 10, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 12. The method of claim 10, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 13. The method of claim 10, wherein the first contact metal is different from the third contact metal. 14. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 15. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 16. The method of claim 9, wherein the first and second raised features are fins that extend through a shallow trench isolation (STI) layer. 17. The method of claim 9, wherein forming the first contact metal on the first downward facing surface and forming the second contact metal on the first upward facing surface includes: conformally depositing the first contact metal on the first upward facing surface and on the first downward facing surface; removing the first contact metal from the first upward facing surface; and depositing the second contact metal on the first upward facing surface. 18. The method of claim 9, wherein forming the third contact metal on the second downward facing surface and forming the fourth contact metal on the second upward facing surface includes: conformally depositing the third contact metal on the second upward and downward facing surfaces; removing the third contact metal from the second upward facing surface; and depositing the fourth contact metal on the second upward facing surface.
2,800
344,487
29,725,754
2,917
A semiconductor device includes a first raised feature in a NFET region on a substrate, a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface, a first contact metal on the first downward facing surface, and a second contact metal on the first upward facing surface. The device further includes a second raised feature in a PFET region on the substrate, a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface, a third contact metal on the second downward facing surface, and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal.
1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; a first contact metal on the first downward facing surface; a second contact metal on the first upward facing surface; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; a third contact metal on the second downward facing surface; and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 2. The device of claim 1, wherein the first contact metal contains the same metal as the third contact metal. 3. The device of claim 2, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 4. The device of claim 2, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 5. The device of claim 1, wherein the first contact metal is different from the third contact metal. 6. The device of claim 5, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 7. The device of claim 5, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 8. The device of claim 1, wherein the first and second raised features are Si fins that extend through a shallow trench isolation (STI) layer. 9. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; forming a first contact metal on the first downward facing surface; forming a second contact metal on the first upward facing surface; providing a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; forming a third contact metal on the second downward facing surface; and forming a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 10. The method of claim 9, wherein the first contact metal contains the same metal as the third contact metal. 11. The method of claim 10, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 12. The method of claim 10, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 13. The method of claim 10, wherein the first contact metal is different from the third contact metal. 14. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 15. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 16. The method of claim 9, wherein the first and second raised features are fins that extend through a shallow trench isolation (STI) layer. 17. The method of claim 9, wherein forming the first contact metal on the first downward facing surface and forming the second contact metal on the first upward facing surface includes: conformally depositing the first contact metal on the first upward facing surface and on the first downward facing surface; removing the first contact metal from the first upward facing surface; and depositing the second contact metal on the first upward facing surface. 18. The method of claim 9, wherein forming the third contact metal on the second downward facing surface and forming the fourth contact metal on the second upward facing surface includes: conformally depositing the third contact metal on the second upward and downward facing surfaces; removing the third contact metal from the second upward facing surface; and depositing the fourth contact metal on the second upward facing surface.
A semiconductor device includes a first raised feature in a NFET region on a substrate, a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface, a first contact metal on the first downward facing surface, and a second contact metal on the first upward facing surface. The device further includes a second raised feature in a PFET region on the substrate, a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface, a third contact metal on the second downward facing surface, and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal.1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; a first contact metal on the first downward facing surface; a second contact metal on the first upward facing surface; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; a third contact metal on the second downward facing surface; and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 2. The device of claim 1, wherein the first contact metal contains the same metal as the third contact metal. 3. The device of claim 2, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 4. The device of claim 2, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 5. The device of claim 1, wherein the first contact metal is different from the third contact metal. 6. The device of claim 5, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 7. The device of claim 5, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 8. The device of claim 1, wherein the first and second raised features are Si fins that extend through a shallow trench isolation (STI) layer. 9. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; forming a first contact metal on the first downward facing surface; forming a second contact metal on the first upward facing surface; providing a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; forming a third contact metal on the second downward facing surface; and forming a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 10. The method of claim 9, wherein the first contact metal contains the same metal as the third contact metal. 11. The method of claim 10, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 12. The method of claim 10, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 13. The method of claim 10, wherein the first contact metal is different from the third contact metal. 14. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 15. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 16. The method of claim 9, wherein the first and second raised features are fins that extend through a shallow trench isolation (STI) layer. 17. The method of claim 9, wherein forming the first contact metal on the first downward facing surface and forming the second contact metal on the first upward facing surface includes: conformally depositing the first contact metal on the first upward facing surface and on the first downward facing surface; removing the first contact metal from the first upward facing surface; and depositing the second contact metal on the first upward facing surface. 18. The method of claim 9, wherein forming the third contact metal on the second downward facing surface and forming the fourth contact metal on the second upward facing surface includes: conformally depositing the third contact metal on the second upward and downward facing surfaces; removing the third contact metal from the second upward facing surface; and depositing the fourth contact metal on the second upward facing surface.
2,900
344,488
16,803,988
2,648
A semiconductor device includes a first raised feature in a NFET region on a substrate, a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface, a first contact metal on the first downward facing surface, and a second contact metal on the first upward facing surface. The device further includes a second raised feature in a PFET region on the substrate, a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface, a third contact metal on the second downward facing surface, and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal.
1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; a first contact metal on the first downward facing surface; a second contact metal on the first upward facing surface; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; a third contact metal on the second downward facing surface; and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 2. The device of claim 1, wherein the first contact metal contains the same metal as the third contact metal. 3. The device of claim 2, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 4. The device of claim 2, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 5. The device of claim 1, wherein the first contact metal is different from the third contact metal. 6. The device of claim 5, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 7. The device of claim 5, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 8. The device of claim 1, wherein the first and second raised features are Si fins that extend through a shallow trench isolation (STI) layer. 9. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; forming a first contact metal on the first downward facing surface; forming a second contact metal on the first upward facing surface; providing a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; forming a third contact metal on the second downward facing surface; and forming a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 10. The method of claim 9, wherein the first contact metal contains the same metal as the third contact metal. 11. The method of claim 10, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 12. The method of claim 10, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 13. The method of claim 10, wherein the first contact metal is different from the third contact metal. 14. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 15. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 16. The method of claim 9, wherein the first and second raised features are fins that extend through a shallow trench isolation (STI) layer. 17. The method of claim 9, wherein forming the first contact metal on the first downward facing surface and forming the second contact metal on the first upward facing surface includes: conformally depositing the first contact metal on the first upward facing surface and on the first downward facing surface; removing the first contact metal from the first upward facing surface; and depositing the second contact metal on the first upward facing surface. 18. The method of claim 9, wherein forming the third contact metal on the second downward facing surface and forming the fourth contact metal on the second upward facing surface includes: conformally depositing the third contact metal on the second upward and downward facing surfaces; removing the third contact metal from the second upward facing surface; and depositing the fourth contact metal on the second upward facing surface.
A semiconductor device includes a first raised feature in a NFET region on a substrate, a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface, a first contact metal on the first downward facing surface, and a second contact metal on the first upward facing surface. The device further includes a second raised feature in a PFET region on the substrate, a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface, a third contact metal on the second downward facing surface, and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal.1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; a first contact metal on the first downward facing surface; a second contact metal on the first upward facing surface; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; a third contact metal on the second downward facing surface; and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 2. The device of claim 1, wherein the first contact metal contains the same metal as the third contact metal. 3. The device of claim 2, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 4. The device of claim 2, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 5. The device of claim 1, wherein the first contact metal is different from the third contact metal. 6. The device of claim 5, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 7. The device of claim 5, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 8. The device of claim 1, wherein the first and second raised features are Si fins that extend through a shallow trench isolation (STI) layer. 9. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; forming a first contact metal on the first downward facing surface; forming a second contact metal on the first upward facing surface; providing a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; forming a third contact metal on the second downward facing surface; and forming a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 10. The method of claim 9, wherein the first contact metal contains the same metal as the third contact metal. 11. The method of claim 10, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 12. The method of claim 10, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 13. The method of claim 10, wherein the first contact metal is different from the third contact metal. 14. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 15. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 16. The method of claim 9, wherein the first and second raised features are fins that extend through a shallow trench isolation (STI) layer. 17. The method of claim 9, wherein forming the first contact metal on the first downward facing surface and forming the second contact metal on the first upward facing surface includes: conformally depositing the first contact metal on the first upward facing surface and on the first downward facing surface; removing the first contact metal from the first upward facing surface; and depositing the second contact metal on the first upward facing surface. 18. The method of claim 9, wherein forming the third contact metal on the second downward facing surface and forming the fourth contact metal on the second upward facing surface includes: conformally depositing the third contact metal on the second upward and downward facing surfaces; removing the third contact metal from the second upward facing surface; and depositing the fourth contact metal on the second upward facing surface.
2,600
344,489
29,725,751
2,912
A semiconductor device includes a first raised feature in a NFET region on a substrate, a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface, a first contact metal on the first downward facing surface, and a second contact metal on the first upward facing surface. The device further includes a second raised feature in a PFET region on the substrate, a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface, a third contact metal on the second downward facing surface, and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal.
1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; a first contact metal on the first downward facing surface; a second contact metal on the first upward facing surface; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; a third contact metal on the second downward facing surface; and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 2. The device of claim 1, wherein the first contact metal contains the same metal as the third contact metal. 3. The device of claim 2, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 4. The device of claim 2, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 5. The device of claim 1, wherein the first contact metal is different from the third contact metal. 6. The device of claim 5, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 7. The device of claim 5, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 8. The device of claim 1, wherein the first and second raised features are Si fins that extend through a shallow trench isolation (STI) layer. 9. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; forming a first contact metal on the first downward facing surface; forming a second contact metal on the first upward facing surface; providing a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; forming a third contact metal on the second downward facing surface; and forming a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 10. The method of claim 9, wherein the first contact metal contains the same metal as the third contact metal. 11. The method of claim 10, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 12. The method of claim 10, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 13. The method of claim 10, wherein the first contact metal is different from the third contact metal. 14. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 15. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 16. The method of claim 9, wherein the first and second raised features are fins that extend through a shallow trench isolation (STI) layer. 17. The method of claim 9, wherein forming the first contact metal on the first downward facing surface and forming the second contact metal on the first upward facing surface includes: conformally depositing the first contact metal on the first upward facing surface and on the first downward facing surface; removing the first contact metal from the first upward facing surface; and depositing the second contact metal on the first upward facing surface. 18. The method of claim 9, wherein forming the third contact metal on the second downward facing surface and forming the fourth contact metal on the second upward facing surface includes: conformally depositing the third contact metal on the second upward and downward facing surfaces; removing the third contact metal from the second upward facing surface; and depositing the fourth contact metal on the second upward facing surface.
A semiconductor device includes a first raised feature in a NFET region on a substrate, a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface, a first contact metal on the first downward facing surface, and a second contact metal on the first upward facing surface. The device further includes a second raised feature in a PFET region on the substrate, a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface, a third contact metal on the second downward facing surface, and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal.1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material grown on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; a first contact metal on the first downward facing surface; a second contact metal on the first upward facing surface; a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material grown on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; a third contact metal on the second downward facing surface; and a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 2. The device of claim 1, wherein the first contact metal contains the same metal as the third contact metal. 3. The device of claim 2, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 4. The device of claim 2, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 5. The device of claim 1, wherein the first contact metal is different from the third contact metal. 6. The device of claim 5, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 7. The device of claim 5, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 8. The device of claim 1, wherein the first and second raised features are Si fins that extend through a shallow trench isolation (STI) layer. 9. A method of forming a semiconductor device, the method comprising: providing a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; growing a first n-type doped epitaxial semiconductor material on the first raised feature, the first n-type doped epitaxial material having a first upward facing surface and a first downward facing surface; forming a first contact metal on the first downward facing surface; forming a second contact metal on the first upward facing surface; providing a second raised feature in a p-type channel field effect transistor (PFET) region on the substrate; growing a second p-type doped epitaxial semiconductor material on the second raised feature, the second p-type doped epitaxial material having a second upward facing surface and a second downward facing surface; forming a third contact metal on the second downward facing surface; and forming a fourth contact metal on the second upward facing surface, wherein the fourth contact metal is different from the second contact metal. 10. The method of claim 9, wherein the first contact metal contains the same metal as the third contact metal. 11. The method of claim 10, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ru or Ti, and the second contact metal layer contains Ti or TiSix. 12. The method of claim 10, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the third contact metal contains Ru or Ti, and the fourth contact metal contains NiPt or Ru. 13. The method of claim 10, wherein the first contact metal is different from the third contact metal. 14. The method of claim 13, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the first contact metal contains Ti, and the second contact metal layer contains Ti or TiSix. 15. The method of claim 13, wherein the second p-type doped epitaxial semiconductor material contains Ge:B on SiGe:B, the third contact metal contains Ru, and the fourth contact metal contains NiPt or Ru. 16. The method of claim 9, wherein the first and second raised features are fins that extend through a shallow trench isolation (STI) layer. 17. The method of claim 9, wherein forming the first contact metal on the first downward facing surface and forming the second contact metal on the first upward facing surface includes: conformally depositing the first contact metal on the first upward facing surface and on the first downward facing surface; removing the first contact metal from the first upward facing surface; and depositing the second contact metal on the first upward facing surface. 18. The method of claim 9, wherein forming the third contact metal on the second downward facing surface and forming the fourth contact metal on the second upward facing surface includes: conformally depositing the third contact metal on the second upward and downward facing surfaces; removing the third contact metal from the second upward facing surface; and depositing the fourth contact metal on the second upward facing surface.
2,900
344,490
16,803,992
2,827
Programmable resistive memory can be fabricated with a non-single-crystalline silicon formed on a flexible substrate. The non-single-crystalline silicon can be amorphous silicon, low-temperature polysilicon (LTPS), organic semiconductor, or metal oxide semiconductor. The flexible substrate can be glass, plastics, paper, metal, paper, or any kinds of flexible film. The programmable resistive memory can be PCRAM, RRAM, MRAM, or OTP. The OTP element can be a silicon, polysilicon, organic or metal oxide electrode. The selector in a programmable resistive memory can be a MOS or diode with top gate, bottom gate, inverted, staggered, or coplanar structures.
1. A programmable resistive memory, comprising: a plurality of programmable resistive cells, at least one of the cells comprising: a programmable resistive element (PRE) having one end coupled to a first supply voltage line; a selector having at least a first active region and a second active region, where the first active region having a first type of dopant and a second active region having a first or a second type of dopant, the first active region providing a first terminal of the selector, the second active region providing a second terminal of the selector, both the first and second active regions built on a non-single-crystal-silicon semiconductor film on an insulator substrate, the first active region coupled to the PRE and the second active region coupled to a second supply voltage line; a gate fabricated on the layer of non-single-crystalline-silicon semiconductor with a sandwich of dielectric in between; the gate coupled to a third supply voltage line that can control conductivity between the first and the second active region; and wherein the PRE is configured to be programmable by applying voltages to the first, second, and/or the third supply voltage lines to thereby change its logic state. 2. A programmable resistive memory as recited in claim 1, wherein the insulator substrate comprises a glass, plastics, paper, metal, cellular, or any kind of flexible film. 3. A programmable resistive memory as recited in claim 1, wherein the non-single-crystal-silicon semiconductor film consists of at least one of amorphous silicon, polycrystalline silicon (polysilicon), or silicon-germanium. 4. A programmable resistive memory as recited in claim 1, wherein the non-single-crystal-silicon semiconductor film consists of at least one of organic or metal oxide semiconductor. 5. A programmable resistive memory as recited in claim 1, wherein the programmable resistive element consists of at least one of a phase-change film in PCRAM or resistive thin film in RRAM. 6. A programmable resistive memory as recited in claim 1, wherein the programmable resistive element consists of at least one of a magnetic tunnel junction (MTJ) in MRAM. 7. A programmable resistive memory as recited in claim 1, wherein programmable resistive element consists of at least one of a one-time-programmable (OTP) element. 8. A programmable resistive memory as recited in claim 7, wherein OTP element consists at least one of a MOS device to trap charges or to be breakdown in gate oxide to determine the program state. 9. A programmable resistive memory as recited in claim 7, wherein OTP element comprises a metal oxide, such as Indium Tin Oxide (ITO) Zinc Oxide (ZnO), Indium Zinc Oxide (IZO), or Indium Gallium Zinc Oxide (IGZO). 10. A programmable resistive memory as recited in claim 7, wherein OTP element comprises an organic semiconductor, such as polymer of thiophene molecules or PMMA (polymethyl-methacrylate). 11. A programmable resistive memory as recited in claim 7, wherein OTP element has a substantially rectangular shape or in serpentine structure. 12. A programmable resistive memory as recited in claim 7, wherein OTP element has an OTP body between two nearest contacts in two ends, and has a length-to-width ratio of between 10 to 80 in the OTP body. 13. A programmable resistive memory as recited in claim 7, wherein the OTP element has at least one bend in the body of OTP element. 14. A programmable resistive memory as recited in claim 7, wherein the OTP element has at least one interconnect underneath the body of the OTP element. 15. An electronics system, comprising: a processor; and a programmable resistive memory operatively connected to the processor, the programmable resistive memory including a plurality of programmable resistive cells, at least one of the cells comprising: a programmable resistive element (PRE) having one end coupled to a first supply voltage line; a selector having at least a first active region and a second active region, where the first active region having a first type of dopant and a second active region having a first or a second type of dopant, the first active region providing a first terminal of the selector, the second active region providing a second terminal of the selector, both the first and second active regions built on a non-single-crystal-silicon semiconductor film on an insulator substrate, the first active region coupled to the PRE and the second active region coupled to a second supply voltage line; and a gate fabricated on the layer of non-single-crystal-silicon semiconductor with a sandwich of dielectric in between, the gate coupled to a third supply voltage line to control the conductivity between the first and the second active region; and wherein the PRE is configured to be programmable by applying voltages to the first, second, and/or the third supply voltage lines to thereby change its logic state. 16. A programmable resistive memory as recited in claim 15, wherein the substrate substantially consists of a glass, plastics, paper, metal, cellular or any kinds of flexible film. 17. A programmable resistive memory as recited in claim 15, wherein the non-single-crystal-silicon semiconductor film substantially consists of at least one of amorphous silicon, polycrystalline silicon (polysilicon), silicon-germanium, organic or metal oxide semiconductor. 18. A programmable resistive memory as recited in claim 15, wherein the programmable resistive element includes an OTP element that has at least one MOS device to trap charges or to be breakdown in gate oxide to determine the program state. 19. A programmable resistive memory as recited in claim 15, wherein the programmable resistive element includes at least one electrode, the electrode including Indium Tin Oxide (ITO), Zinc Oxide (ZnO), Indium Zinc Oxide (IZO), Indium Gallium Zinc Oxide (IGZO), molecules of thiophene, or PMMA. 20. A method for operating a programmable resistive memory on a non-single-crystal-silicon semiconductor, the method comprises: providing a plurality of programmable resistive cells, at least one of the programmable resistive cells includes at least (i) a programmable resistive element having one end coupled to a first supply voltage line; and (ii) a selector having at least one first active region and a second active region, where the first active region having a first type of dopant and the second region having a first or a second type of dopant, both the first and second active regions being fabricated on an insulator substrate, the first active region coupled to the OTP element, and the second active region coupled to a second supply voltage line, (iii) a gate fabricated on the non-crystalline semiconductor with a sandwich of dielectric in between, the gate coupled to a third supply voltage to control the conductivity between the first and the second active regions; and programming a logic state into at least one of the programmable resistive cells by applying voltages to the first, the second, and/or the third voltage lines.
Programmable resistive memory can be fabricated with a non-single-crystalline silicon formed on a flexible substrate. The non-single-crystalline silicon can be amorphous silicon, low-temperature polysilicon (LTPS), organic semiconductor, or metal oxide semiconductor. The flexible substrate can be glass, plastics, paper, metal, paper, or any kinds of flexible film. The programmable resistive memory can be PCRAM, RRAM, MRAM, or OTP. The OTP element can be a silicon, polysilicon, organic or metal oxide electrode. The selector in a programmable resistive memory can be a MOS or diode with top gate, bottom gate, inverted, staggered, or coplanar structures.1. A programmable resistive memory, comprising: a plurality of programmable resistive cells, at least one of the cells comprising: a programmable resistive element (PRE) having one end coupled to a first supply voltage line; a selector having at least a first active region and a second active region, where the first active region having a first type of dopant and a second active region having a first or a second type of dopant, the first active region providing a first terminal of the selector, the second active region providing a second terminal of the selector, both the first and second active regions built on a non-single-crystal-silicon semiconductor film on an insulator substrate, the first active region coupled to the PRE and the second active region coupled to a second supply voltage line; a gate fabricated on the layer of non-single-crystalline-silicon semiconductor with a sandwich of dielectric in between; the gate coupled to a third supply voltage line that can control conductivity between the first and the second active region; and wherein the PRE is configured to be programmable by applying voltages to the first, second, and/or the third supply voltage lines to thereby change its logic state. 2. A programmable resistive memory as recited in claim 1, wherein the insulator substrate comprises a glass, plastics, paper, metal, cellular, or any kind of flexible film. 3. A programmable resistive memory as recited in claim 1, wherein the non-single-crystal-silicon semiconductor film consists of at least one of amorphous silicon, polycrystalline silicon (polysilicon), or silicon-germanium. 4. A programmable resistive memory as recited in claim 1, wherein the non-single-crystal-silicon semiconductor film consists of at least one of organic or metal oxide semiconductor. 5. A programmable resistive memory as recited in claim 1, wherein the programmable resistive element consists of at least one of a phase-change film in PCRAM or resistive thin film in RRAM. 6. A programmable resistive memory as recited in claim 1, wherein the programmable resistive element consists of at least one of a magnetic tunnel junction (MTJ) in MRAM. 7. A programmable resistive memory as recited in claim 1, wherein programmable resistive element consists of at least one of a one-time-programmable (OTP) element. 8. A programmable resistive memory as recited in claim 7, wherein OTP element consists at least one of a MOS device to trap charges or to be breakdown in gate oxide to determine the program state. 9. A programmable resistive memory as recited in claim 7, wherein OTP element comprises a metal oxide, such as Indium Tin Oxide (ITO) Zinc Oxide (ZnO), Indium Zinc Oxide (IZO), or Indium Gallium Zinc Oxide (IGZO). 10. A programmable resistive memory as recited in claim 7, wherein OTP element comprises an organic semiconductor, such as polymer of thiophene molecules or PMMA (polymethyl-methacrylate). 11. A programmable resistive memory as recited in claim 7, wherein OTP element has a substantially rectangular shape or in serpentine structure. 12. A programmable resistive memory as recited in claim 7, wherein OTP element has an OTP body between two nearest contacts in two ends, and has a length-to-width ratio of between 10 to 80 in the OTP body. 13. A programmable resistive memory as recited in claim 7, wherein the OTP element has at least one bend in the body of OTP element. 14. A programmable resistive memory as recited in claim 7, wherein the OTP element has at least one interconnect underneath the body of the OTP element. 15. An electronics system, comprising: a processor; and a programmable resistive memory operatively connected to the processor, the programmable resistive memory including a plurality of programmable resistive cells, at least one of the cells comprising: a programmable resistive element (PRE) having one end coupled to a first supply voltage line; a selector having at least a first active region and a second active region, where the first active region having a first type of dopant and a second active region having a first or a second type of dopant, the first active region providing a first terminal of the selector, the second active region providing a second terminal of the selector, both the first and second active regions built on a non-single-crystal-silicon semiconductor film on an insulator substrate, the first active region coupled to the PRE and the second active region coupled to a second supply voltage line; and a gate fabricated on the layer of non-single-crystal-silicon semiconductor with a sandwich of dielectric in between, the gate coupled to a third supply voltage line to control the conductivity between the first and the second active region; and wherein the PRE is configured to be programmable by applying voltages to the first, second, and/or the third supply voltage lines to thereby change its logic state. 16. A programmable resistive memory as recited in claim 15, wherein the substrate substantially consists of a glass, plastics, paper, metal, cellular or any kinds of flexible film. 17. A programmable resistive memory as recited in claim 15, wherein the non-single-crystal-silicon semiconductor film substantially consists of at least one of amorphous silicon, polycrystalline silicon (polysilicon), silicon-germanium, organic or metal oxide semiconductor. 18. A programmable resistive memory as recited in claim 15, wherein the programmable resistive element includes an OTP element that has at least one MOS device to trap charges or to be breakdown in gate oxide to determine the program state. 19. A programmable resistive memory as recited in claim 15, wherein the programmable resistive element includes at least one electrode, the electrode including Indium Tin Oxide (ITO), Zinc Oxide (ZnO), Indium Zinc Oxide (IZO), Indium Gallium Zinc Oxide (IGZO), molecules of thiophene, or PMMA. 20. A method for operating a programmable resistive memory on a non-single-crystal-silicon semiconductor, the method comprises: providing a plurality of programmable resistive cells, at least one of the programmable resistive cells includes at least (i) a programmable resistive element having one end coupled to a first supply voltage line; and (ii) a selector having at least one first active region and a second active region, where the first active region having a first type of dopant and the second region having a first or a second type of dopant, both the first and second active regions being fabricated on an insulator substrate, the first active region coupled to the OTP element, and the second active region coupled to a second supply voltage line, (iii) a gate fabricated on the non-crystalline semiconductor with a sandwich of dielectric in between, the gate coupled to a third supply voltage to control the conductivity between the first and the second active regions; and programming a logic state into at least one of the programmable resistive cells by applying voltages to the first, the second, and/or the third voltage lines.
2,800
344,491
16,803,998
3,689
The present disclosure discloses a system and method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities. In at least one embodiment of the present disclosure, a method for creating a shared customer relations management (CRM) system includes creating a plurality of relationships between a plurality of parties in a shared CRM system; creating a shared space in the shared CRM system, enabling the plurality of businesses and customers to access the shared CRM, enabling both the plurality of businesses and customers to access the shared CRM and defining desired outcomes for the plurality of businesses and customers in the shared CRM, and measuring the success of the desired outcomes of the plurality of businesses and customers in the shared CRM.
1. A method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities, the method comprising the steps: configuring at least one core object for a supplier, a buyer, and a supplier platform; configuring a plurality of objects representative of a identifier for the each supplier and buyer; receiving an event data from at least one supplier, buyer, or supplier platform, at an event queue; normalizing an identity for the each of the supplier, buyer; normalizing a field name at a field normalizer for the event data; filtering events based at least in part on a desired outcome of the each of a supplier, a buyer; creating an object model timeline based on a processed event from the at least one of a supplier, a buyer, or a supplier platform, at an event queue; updating the at least one core object or plurality of core objects based at least in part on the filtered events; assessing the desired outcome for the each supplier and buyer, based at least in part on a business goal for the each of the supplier and buyer; and determining a state for the desired outcome. 2. The method of claim 1, wherein configuring at least one core object for a supplier, a buyer, and a supplier platform comprises a definition of a metric. 3. The method of claim 1, wherein configuring a plurality of objects is selected form a group consisting of a customer, a vendor, a person, a contract, and a desired outcome. 4. The method of claim 1, wherein the event data is received at an event queue and ingested into an immutable log. 5. The method of claim 1, wherein filtering events based at least in part on a desired outcome of the each of a supplier and a buyer comprises determining declarative events, based at least in part on a user defined criteria. 6. The method of claim 1, wherein creating an object model timeline comprises a pre-defined time bucket. 7. The method of claim 1, wherein the business goal for the each of the supplier and buyer are managed by the buyer. 8. The method of claim 1, wherein determining a state for the desired outcome is ongoing and continuous.
The present disclosure discloses a system and method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities. In at least one embodiment of the present disclosure, a method for creating a shared customer relations management (CRM) system includes creating a plurality of relationships between a plurality of parties in a shared CRM system; creating a shared space in the shared CRM system, enabling the plurality of businesses and customers to access the shared CRM, enabling both the plurality of businesses and customers to access the shared CRM and defining desired outcomes for the plurality of businesses and customers in the shared CRM, and measuring the success of the desired outcomes of the plurality of businesses and customers in the shared CRM.1. A method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities, the method comprising the steps: configuring at least one core object for a supplier, a buyer, and a supplier platform; configuring a plurality of objects representative of a identifier for the each supplier and buyer; receiving an event data from at least one supplier, buyer, or supplier platform, at an event queue; normalizing an identity for the each of the supplier, buyer; normalizing a field name at a field normalizer for the event data; filtering events based at least in part on a desired outcome of the each of a supplier, a buyer; creating an object model timeline based on a processed event from the at least one of a supplier, a buyer, or a supplier platform, at an event queue; updating the at least one core object or plurality of core objects based at least in part on the filtered events; assessing the desired outcome for the each supplier and buyer, based at least in part on a business goal for the each of the supplier and buyer; and determining a state for the desired outcome. 2. The method of claim 1, wherein configuring at least one core object for a supplier, a buyer, and a supplier platform comprises a definition of a metric. 3. The method of claim 1, wherein configuring a plurality of objects is selected form a group consisting of a customer, a vendor, a person, a contract, and a desired outcome. 4. The method of claim 1, wherein the event data is received at an event queue and ingested into an immutable log. 5. The method of claim 1, wherein filtering events based at least in part on a desired outcome of the each of a supplier and a buyer comprises determining declarative events, based at least in part on a user defined criteria. 6. The method of claim 1, wherein creating an object model timeline comprises a pre-defined time bucket. 7. The method of claim 1, wherein the business goal for the each of the supplier and buyer are managed by the buyer. 8. The method of claim 1, wherein determining a state for the desired outcome is ongoing and continuous.
3,600
344,492
29,725,757
2,916
The present disclosure discloses a system and method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities. In at least one embodiment of the present disclosure, a method for creating a shared customer relations management (CRM) system includes creating a plurality of relationships between a plurality of parties in a shared CRM system; creating a shared space in the shared CRM system, enabling the plurality of businesses and customers to access the shared CRM, enabling both the plurality of businesses and customers to access the shared CRM and defining desired outcomes for the plurality of businesses and customers in the shared CRM, and measuring the success of the desired outcomes of the plurality of businesses and customers in the shared CRM.
1. A method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities, the method comprising the steps: configuring at least one core object for a supplier, a buyer, and a supplier platform; configuring a plurality of objects representative of a identifier for the each supplier and buyer; receiving an event data from at least one supplier, buyer, or supplier platform, at an event queue; normalizing an identity for the each of the supplier, buyer; normalizing a field name at a field normalizer for the event data; filtering events based at least in part on a desired outcome of the each of a supplier, a buyer; creating an object model timeline based on a processed event from the at least one of a supplier, a buyer, or a supplier platform, at an event queue; updating the at least one core object or plurality of core objects based at least in part on the filtered events; assessing the desired outcome for the each supplier and buyer, based at least in part on a business goal for the each of the supplier and buyer; and determining a state for the desired outcome. 2. The method of claim 1, wherein configuring at least one core object for a supplier, a buyer, and a supplier platform comprises a definition of a metric. 3. The method of claim 1, wherein configuring a plurality of objects is selected form a group consisting of a customer, a vendor, a person, a contract, and a desired outcome. 4. The method of claim 1, wherein the event data is received at an event queue and ingested into an immutable log. 5. The method of claim 1, wherein filtering events based at least in part on a desired outcome of the each of a supplier and a buyer comprises determining declarative events, based at least in part on a user defined criteria. 6. The method of claim 1, wherein creating an object model timeline comprises a pre-defined time bucket. 7. The method of claim 1, wherein the business goal for the each of the supplier and buyer are managed by the buyer. 8. The method of claim 1, wherein determining a state for the desired outcome is ongoing and continuous.
The present disclosure discloses a system and method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities. In at least one embodiment of the present disclosure, a method for creating a shared customer relations management (CRM) system includes creating a plurality of relationships between a plurality of parties in a shared CRM system; creating a shared space in the shared CRM system, enabling the plurality of businesses and customers to access the shared CRM, enabling both the plurality of businesses and customers to access the shared CRM and defining desired outcomes for the plurality of businesses and customers in the shared CRM, and measuring the success of the desired outcomes of the plurality of businesses and customers in the shared CRM.1. A method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities, the method comprising the steps: configuring at least one core object for a supplier, a buyer, and a supplier platform; configuring a plurality of objects representative of a identifier for the each supplier and buyer; receiving an event data from at least one supplier, buyer, or supplier platform, at an event queue; normalizing an identity for the each of the supplier, buyer; normalizing a field name at a field normalizer for the event data; filtering events based at least in part on a desired outcome of the each of a supplier, a buyer; creating an object model timeline based on a processed event from the at least one of a supplier, a buyer, or a supplier platform, at an event queue; updating the at least one core object or plurality of core objects based at least in part on the filtered events; assessing the desired outcome for the each supplier and buyer, based at least in part on a business goal for the each of the supplier and buyer; and determining a state for the desired outcome. 2. The method of claim 1, wherein configuring at least one core object for a supplier, a buyer, and a supplier platform comprises a definition of a metric. 3. The method of claim 1, wherein configuring a plurality of objects is selected form a group consisting of a customer, a vendor, a person, a contract, and a desired outcome. 4. The method of claim 1, wherein the event data is received at an event queue and ingested into an immutable log. 5. The method of claim 1, wherein filtering events based at least in part on a desired outcome of the each of a supplier and a buyer comprises determining declarative events, based at least in part on a user defined criteria. 6. The method of claim 1, wherein creating an object model timeline comprises a pre-defined time bucket. 7. The method of claim 1, wherein the business goal for the each of the supplier and buyer are managed by the buyer. 8. The method of claim 1, wherein determining a state for the desired outcome is ongoing and continuous.
2,900
344,493
16,803,978
2,419
The present disclosure discloses a system and method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities. In at least one embodiment of the present disclosure, a method for creating a shared customer relations management (CRM) system includes creating a plurality of relationships between a plurality of parties in a shared CRM system; creating a shared space in the shared CRM system, enabling the plurality of businesses and customers to access the shared CRM, enabling both the plurality of businesses and customers to access the shared CRM and defining desired outcomes for the plurality of businesses and customers in the shared CRM, and measuring the success of the desired outcomes of the plurality of businesses and customers in the shared CRM.
1. A method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities, the method comprising the steps: configuring at least one core object for a supplier, a buyer, and a supplier platform; configuring a plurality of objects representative of a identifier for the each supplier and buyer; receiving an event data from at least one supplier, buyer, or supplier platform, at an event queue; normalizing an identity for the each of the supplier, buyer; normalizing a field name at a field normalizer for the event data; filtering events based at least in part on a desired outcome of the each of a supplier, a buyer; creating an object model timeline based on a processed event from the at least one of a supplier, a buyer, or a supplier platform, at an event queue; updating the at least one core object or plurality of core objects based at least in part on the filtered events; assessing the desired outcome for the each supplier and buyer, based at least in part on a business goal for the each of the supplier and buyer; and determining a state for the desired outcome. 2. The method of claim 1, wherein configuring at least one core object for a supplier, a buyer, and a supplier platform comprises a definition of a metric. 3. The method of claim 1, wherein configuring a plurality of objects is selected form a group consisting of a customer, a vendor, a person, a contract, and a desired outcome. 4. The method of claim 1, wherein the event data is received at an event queue and ingested into an immutable log. 5. The method of claim 1, wherein filtering events based at least in part on a desired outcome of the each of a supplier and a buyer comprises determining declarative events, based at least in part on a user defined criteria. 6. The method of claim 1, wherein creating an object model timeline comprises a pre-defined time bucket. 7. The method of claim 1, wherein the business goal for the each of the supplier and buyer are managed by the buyer. 8. The method of claim 1, wherein determining a state for the desired outcome is ongoing and continuous.
The present disclosure discloses a system and method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities. In at least one embodiment of the present disclosure, a method for creating a shared customer relations management (CRM) system includes creating a plurality of relationships between a plurality of parties in a shared CRM system; creating a shared space in the shared CRM system, enabling the plurality of businesses and customers to access the shared CRM, enabling both the plurality of businesses and customers to access the shared CRM and defining desired outcomes for the plurality of businesses and customers in the shared CRM, and measuring the success of the desired outcomes of the plurality of businesses and customers in the shared CRM.1. A method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities, the method comprising the steps: configuring at least one core object for a supplier, a buyer, and a supplier platform; configuring a plurality of objects representative of a identifier for the each supplier and buyer; receiving an event data from at least one supplier, buyer, or supplier platform, at an event queue; normalizing an identity for the each of the supplier, buyer; normalizing a field name at a field normalizer for the event data; filtering events based at least in part on a desired outcome of the each of a supplier, a buyer; creating an object model timeline based on a processed event from the at least one of a supplier, a buyer, or a supplier platform, at an event queue; updating the at least one core object or plurality of core objects based at least in part on the filtered events; assessing the desired outcome for the each supplier and buyer, based at least in part on a business goal for the each of the supplier and buyer; and determining a state for the desired outcome. 2. The method of claim 1, wherein configuring at least one core object for a supplier, a buyer, and a supplier platform comprises a definition of a metric. 3. The method of claim 1, wherein configuring a plurality of objects is selected form a group consisting of a customer, a vendor, a person, a contract, and a desired outcome. 4. The method of claim 1, wherein the event data is received at an event queue and ingested into an immutable log. 5. The method of claim 1, wherein filtering events based at least in part on a desired outcome of the each of a supplier and a buyer comprises determining declarative events, based at least in part on a user defined criteria. 6. The method of claim 1, wherein creating an object model timeline comprises a pre-defined time bucket. 7. The method of claim 1, wherein the business goal for the each of the supplier and buyer are managed by the buyer. 8. The method of claim 1, wherein determining a state for the desired outcome is ongoing and continuous.
2,400
344,494
16,803,962
2,419
The present disclosure discloses a system and method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities. In at least one embodiment of the present disclosure, a method for creating a shared customer relations management (CRM) system includes creating a plurality of relationships between a plurality of parties in a shared CRM system; creating a shared space in the shared CRM system, enabling the plurality of businesses and customers to access the shared CRM, enabling both the plurality of businesses and customers to access the shared CRM and defining desired outcomes for the plurality of businesses and customers in the shared CRM, and measuring the success of the desired outcomes of the plurality of businesses and customers in the shared CRM.
1. A method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities, the method comprising the steps: configuring at least one core object for a supplier, a buyer, and a supplier platform; configuring a plurality of objects representative of a identifier for the each supplier and buyer; receiving an event data from at least one supplier, buyer, or supplier platform, at an event queue; normalizing an identity for the each of the supplier, buyer; normalizing a field name at a field normalizer for the event data; filtering events based at least in part on a desired outcome of the each of a supplier, a buyer; creating an object model timeline based on a processed event from the at least one of a supplier, a buyer, or a supplier platform, at an event queue; updating the at least one core object or plurality of core objects based at least in part on the filtered events; assessing the desired outcome for the each supplier and buyer, based at least in part on a business goal for the each of the supplier and buyer; and determining a state for the desired outcome. 2. The method of claim 1, wherein configuring at least one core object for a supplier, a buyer, and a supplier platform comprises a definition of a metric. 3. The method of claim 1, wherein configuring a plurality of objects is selected form a group consisting of a customer, a vendor, a person, a contract, and a desired outcome. 4. The method of claim 1, wherein the event data is received at an event queue and ingested into an immutable log. 5. The method of claim 1, wherein filtering events based at least in part on a desired outcome of the each of a supplier and a buyer comprises determining declarative events, based at least in part on a user defined criteria. 6. The method of claim 1, wherein creating an object model timeline comprises a pre-defined time bucket. 7. The method of claim 1, wherein the business goal for the each of the supplier and buyer are managed by the buyer. 8. The method of claim 1, wherein determining a state for the desired outcome is ongoing and continuous.
The present disclosure discloses a system and method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities. In at least one embodiment of the present disclosure, a method for creating a shared customer relations management (CRM) system includes creating a plurality of relationships between a plurality of parties in a shared CRM system; creating a shared space in the shared CRM system, enabling the plurality of businesses and customers to access the shared CRM, enabling both the plurality of businesses and customers to access the shared CRM and defining desired outcomes for the plurality of businesses and customers in the shared CRM, and measuring the success of the desired outcomes of the plurality of businesses and customers in the shared CRM.1. A method for customer relationship management in which a business network is created for a plurality of businesses in a shared CRM based on normalized entities, the method comprising the steps: configuring at least one core object for a supplier, a buyer, and a supplier platform; configuring a plurality of objects representative of a identifier for the each supplier and buyer; receiving an event data from at least one supplier, buyer, or supplier platform, at an event queue; normalizing an identity for the each of the supplier, buyer; normalizing a field name at a field normalizer for the event data; filtering events based at least in part on a desired outcome of the each of a supplier, a buyer; creating an object model timeline based on a processed event from the at least one of a supplier, a buyer, or a supplier platform, at an event queue; updating the at least one core object or plurality of core objects based at least in part on the filtered events; assessing the desired outcome for the each supplier and buyer, based at least in part on a business goal for the each of the supplier and buyer; and determining a state for the desired outcome. 2. The method of claim 1, wherein configuring at least one core object for a supplier, a buyer, and a supplier platform comprises a definition of a metric. 3. The method of claim 1, wherein configuring a plurality of objects is selected form a group consisting of a customer, a vendor, a person, a contract, and a desired outcome. 4. The method of claim 1, wherein the event data is received at an event queue and ingested into an immutable log. 5. The method of claim 1, wherein filtering events based at least in part on a desired outcome of the each of a supplier and a buyer comprises determining declarative events, based at least in part on a user defined criteria. 6. The method of claim 1, wherein creating an object model timeline comprises a pre-defined time bucket. 7. The method of claim 1, wherein the business goal for the each of the supplier and buyer are managed by the buyer. 8. The method of claim 1, wherein determining a state for the desired outcome is ongoing and continuous.
2,400
344,495
16,803,995
2,419
Low-resistivity dual silicide contacts for aggressively scaled semiconductor devices. A semiconductor device includes a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate, a first n-type doped epitaxial semiconductor material wrapped around the first raised feature, a first metal silicide contact layer wrapped around the first n-type doped epitaxial semiconductor material, a second raised feature in p-type channel field effect transistor (PFET) region on the substrate, a second p-type epitaxial semiconductor material wrapped around the second raised feature, and a second metal silicide contact layer wrapped around the second p-type doped epitaxial semiconductor material. The first metal silicide contact layer can include a titanium silicide and the second metal silicide contact layer can include a ruthenium silicide.
1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material wrapped around the first raised feature; a first metal silicide contact layer wrapped around the first n-type doped epitaxial semiconductor material; a second raised feature in p-type channel field effect transistor (PFET) region on the substrate; a second p-type epitaxial semiconductor material wrapped around the second raised feature; and a second metal silicide contact layer wrapped around the second p-type doped epitaxial semiconductor material. 2. The device of claim 1, wherein the first and second raised features contain Si fins. 3. The device of claim 1, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As. 4. The device of claim 1, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B. 5. The device of claim 1, wherein the first and second doped epitaxial materials each have upward facing surfaces and downward facing surfaces, and the first and second metal silicide contact layers are formed on the upward facing surfaces and on the downward facing surfaces. 6. The device of claim 1, wherein the first metal silicide contact layer includes a titanium silicide and the second metal silicide contact layer contains a silicide of ruthenium (Ru), rhodium (Rh), palladium (Pd), osmium (Os), iridium (Ir), or platinum (Pt). 7. The device of claim 1, further comprising: a titanium nitride (TiN) layer directly on the first silicide contact layer and on the second metal silicide contact layer; and a cobalt metal layer or a ruthenium metal layer on the TiN layer. 8. A semiconductor device, comprising: a first raised Si feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material wrapped around the first raised Si feature, the first doped epitaxial semiconductor material containing Si:P or Si:As; a titanium silicide contact layer wrapped around the first n-type doped epitaxial semiconductor material; a second raised Si feature in p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material wrapped around the second raised feature, the second p-type epitaxial semiconductor material containing Si:B or SiGe:B; and a ruthenium silicide contact layer wrapped around the second p-type doped epitaxial semiconductor material. 9. The device of claim 8, wherein the first and second doped epitaxial materials each have upward facing surfaces and downward facing surfaces, and the titanium silicide contact layer and the ruthenium silicide contact layer are formed on the upward facing surfaces and on the downward facing surfaces. 10. The device of claim 8, further comprising: a titanium nitride (TiN) layer directly on the titanium silicide contact layer and on the ruthenium silicide contact layer; and a cobalt (Co) metal layer or a ruthenium (Ru) metal layer on the TiN layer. 11. A method of forming a semiconductor device, the method comprising: growing a first n-type doped epitaxial semiconductor material on a first raised feature in a n-type channel field effect transistor (NFET) region of a substrate, wherein the first n-type doped epitaxial semiconductor material is wrapped around the first raised feature; selectively depositing a first metal layer on the first n-type doped epitaxial semiconductor material; annealing the substrate to form a first metal silicide contact layer on the first n-type doped epitaxial semiconductor material by a salicidation reaction between the first contact metal and the first n-type doped epitaxial semiconductor material; growing a second p-type doped epitaxial semiconductor material on a second raised feature in a p-type channel field effect transistor (PFET) region of the substrate; selectively depositing a second metal layer on the second p-type doped epitaxial semiconductor material; and annealing the substrate to form a second metal silicide contact layer on the second p-type doped epitaxial semiconductor material by a salicidation reaction between the second contact metal and the second p-type doped epitaxial semiconductor material. 12. The method of claim 11, wherein the first and second raised features contain Si. 13. The method of claim 11, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As. 14. The device of claim 11, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B. 15. The method of claim 11, wherein the first and second doped epitaxial materials each have an upward facing surface and a downward facing surface. 16. The method of claim 11, wherein the first metal layer includes titanium metal and the second metal layer includes ruthenium metal. 17. The method of claim 11, wherein the first metal silicide contact layer includes a titanium silicide and the second metal silicide contact layer contains a silicide of ruthenium (Ru), rhodium (Rh), palladium (Pd), osmium (Os), iridium (Ir), or platinum (Pt). 18. The method of claim 11, further comprising: a titanium nitride (TiN) layer directly on the first metal silicide contact layer and on the second metal silicide contact layer; and a cobalt (Co) metal layer or a ruthenium (Ru) metal layer on the TiN layer. 19. The method of claim 11, wherein the first and second raised features contain Si, the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the first metal silicide contact layer includes a titanium silicide, and the second metal silicide contact layer includes a ruthenium silicide. 20. The method of claim 11, wherein the first and second doped epitaxial materials each have an upward facing surface and a downward facing surface.
Low-resistivity dual silicide contacts for aggressively scaled semiconductor devices. A semiconductor device includes a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate, a first n-type doped epitaxial semiconductor material wrapped around the first raised feature, a first metal silicide contact layer wrapped around the first n-type doped epitaxial semiconductor material, a second raised feature in p-type channel field effect transistor (PFET) region on the substrate, a second p-type epitaxial semiconductor material wrapped around the second raised feature, and a second metal silicide contact layer wrapped around the second p-type doped epitaxial semiconductor material. The first metal silicide contact layer can include a titanium silicide and the second metal silicide contact layer can include a ruthenium silicide.1. A semiconductor device, comprising: a first raised feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material wrapped around the first raised feature; a first metal silicide contact layer wrapped around the first n-type doped epitaxial semiconductor material; a second raised feature in p-type channel field effect transistor (PFET) region on the substrate; a second p-type epitaxial semiconductor material wrapped around the second raised feature; and a second metal silicide contact layer wrapped around the second p-type doped epitaxial semiconductor material. 2. The device of claim 1, wherein the first and second raised features contain Si fins. 3. The device of claim 1, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As. 4. The device of claim 1, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B. 5. The device of claim 1, wherein the first and second doped epitaxial materials each have upward facing surfaces and downward facing surfaces, and the first and second metal silicide contact layers are formed on the upward facing surfaces and on the downward facing surfaces. 6. The device of claim 1, wherein the first metal silicide contact layer includes a titanium silicide and the second metal silicide contact layer contains a silicide of ruthenium (Ru), rhodium (Rh), palladium (Pd), osmium (Os), iridium (Ir), or platinum (Pt). 7. The device of claim 1, further comprising: a titanium nitride (TiN) layer directly on the first silicide contact layer and on the second metal silicide contact layer; and a cobalt metal layer or a ruthenium metal layer on the TiN layer. 8. A semiconductor device, comprising: a first raised Si feature in a n-type channel field effect transistor (NFET) region on a substrate; a first n-type doped epitaxial semiconductor material wrapped around the first raised Si feature, the first doped epitaxial semiconductor material containing Si:P or Si:As; a titanium silicide contact layer wrapped around the first n-type doped epitaxial semiconductor material; a second raised Si feature in p-type channel field effect transistor (PFET) region on the substrate; a second p-type doped epitaxial semiconductor material wrapped around the second raised feature, the second p-type epitaxial semiconductor material containing Si:B or SiGe:B; and a ruthenium silicide contact layer wrapped around the second p-type doped epitaxial semiconductor material. 9. The device of claim 8, wherein the first and second doped epitaxial materials each have upward facing surfaces and downward facing surfaces, and the titanium silicide contact layer and the ruthenium silicide contact layer are formed on the upward facing surfaces and on the downward facing surfaces. 10. The device of claim 8, further comprising: a titanium nitride (TiN) layer directly on the titanium silicide contact layer and on the ruthenium silicide contact layer; and a cobalt (Co) metal layer or a ruthenium (Ru) metal layer on the TiN layer. 11. A method of forming a semiconductor device, the method comprising: growing a first n-type doped epitaxial semiconductor material on a first raised feature in a n-type channel field effect transistor (NFET) region of a substrate, wherein the first n-type doped epitaxial semiconductor material is wrapped around the first raised feature; selectively depositing a first metal layer on the first n-type doped epitaxial semiconductor material; annealing the substrate to form a first metal silicide contact layer on the first n-type doped epitaxial semiconductor material by a salicidation reaction between the first contact metal and the first n-type doped epitaxial semiconductor material; growing a second p-type doped epitaxial semiconductor material on a second raised feature in a p-type channel field effect transistor (PFET) region of the substrate; selectively depositing a second metal layer on the second p-type doped epitaxial semiconductor material; and annealing the substrate to form a second metal silicide contact layer on the second p-type doped epitaxial semiconductor material by a salicidation reaction between the second contact metal and the second p-type doped epitaxial semiconductor material. 12. The method of claim 11, wherein the first and second raised features contain Si. 13. The method of claim 11, wherein the first n-type doped epitaxial semiconductor material contains Si:P or Si:As. 14. The device of claim 11, wherein the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B. 15. The method of claim 11, wherein the first and second doped epitaxial materials each have an upward facing surface and a downward facing surface. 16. The method of claim 11, wherein the first metal layer includes titanium metal and the second metal layer includes ruthenium metal. 17. The method of claim 11, wherein the first metal silicide contact layer includes a titanium silicide and the second metal silicide contact layer contains a silicide of ruthenium (Ru), rhodium (Rh), palladium (Pd), osmium (Os), iridium (Ir), or platinum (Pt). 18. The method of claim 11, further comprising: a titanium nitride (TiN) layer directly on the first metal silicide contact layer and on the second metal silicide contact layer; and a cobalt (Co) metal layer or a ruthenium (Ru) metal layer on the TiN layer. 19. The method of claim 11, wherein the first and second raised features contain Si, the first n-type doped epitaxial semiconductor material contains Si:P or Si:As, the second p-type doped epitaxial semiconductor material contains Si:B or SiGe:B, the first metal silicide contact layer includes a titanium silicide, and the second metal silicide contact layer includes a ruthenium silicide. 20. The method of claim 11, wherein the first and second doped epitaxial materials each have an upward facing surface and a downward facing surface.
2,400
344,496
16,803,991
2,419
The present disclosure discloses a system and method for creating a shared Customer Relations Management (CRM) system using normalized identities. In at least one embodiment of the present disclosure, a method for creating a shared Customer Relations Management (CRM) system includes: creating a Software as a Service (SaaS) CRM; creating a shared space in the SaaS CRM; enabling both business and customer to access the SaaS CRM; enabling both the business and customer to access the shared space in the SaaS CRM; defining desired outcomes for both the business and customer in the SaaS CRM; and measuring the success of the desired outcomes of the business and customer in the SaaS CRM.
1. A method for shared customer relationship management (CRM) using event based normalization, the method comprising the steps: configuring at least one core object for a supplier, a buyer, and a supplier platform; configuring a plurality of objects representative of a identifier for the each supplier and buyer; receiving an event data from at least one supplier, buyer, or supplier platform, at an event queue; normalizing an identity for the each of the supplier, buyer; normalizing a field name at a field normalizer for the event data; filtering events based at least in part on a desired outcome of the each of a supplier, a buyer; creating an object model timeline based on a processed event from the at least one of a supplier, a buyer, or a supplier platform, at an event queue; updating the at least one core object or plurality of core objects based at least in part on the filtered events; assessing the desired outcome for the each supplier and buyer, based at least in part on a business goal for the each of the supplier and buyer; and determining a state for the desired outcome. 2. The method of claim 1, wherein configuring at least one core object for a supplier, a buyer, and a supplier platform comprises a definition of a metric. 3. The method of claim 1, wherein configuring a plurality of objects is selected form a group consisting of a customer, a vendor, a person, a contract, and a desired outcome. 4. The method of claim 1, wherein the event data is received at an event queue and ingested into an immutable log. 5. The method of claim 1, wherein filtering events based at least in part on a desired outcome of the each of a supplier and a buyer comprises determining declarative events, based at least in part on a user defined criteria. 6. The method of claim 1, wherein creating an object model timeline comprises a pre-defined time bucket. 7. The method of claim 1, wherein the business goal for the each of the supplier and buyer are managed by the buyer. 8. The method of claim 1, wherein determining a state for the desired outcome is ongoing and continuous.
The present disclosure discloses a system and method for creating a shared Customer Relations Management (CRM) system using normalized identities. In at least one embodiment of the present disclosure, a method for creating a shared Customer Relations Management (CRM) system includes: creating a Software as a Service (SaaS) CRM; creating a shared space in the SaaS CRM; enabling both business and customer to access the SaaS CRM; enabling both the business and customer to access the shared space in the SaaS CRM; defining desired outcomes for both the business and customer in the SaaS CRM; and measuring the success of the desired outcomes of the business and customer in the SaaS CRM.1. A method for shared customer relationship management (CRM) using event based normalization, the method comprising the steps: configuring at least one core object for a supplier, a buyer, and a supplier platform; configuring a plurality of objects representative of a identifier for the each supplier and buyer; receiving an event data from at least one supplier, buyer, or supplier platform, at an event queue; normalizing an identity for the each of the supplier, buyer; normalizing a field name at a field normalizer for the event data; filtering events based at least in part on a desired outcome of the each of a supplier, a buyer; creating an object model timeline based on a processed event from the at least one of a supplier, a buyer, or a supplier platform, at an event queue; updating the at least one core object or plurality of core objects based at least in part on the filtered events; assessing the desired outcome for the each supplier and buyer, based at least in part on a business goal for the each of the supplier and buyer; and determining a state for the desired outcome. 2. The method of claim 1, wherein configuring at least one core object for a supplier, a buyer, and a supplier platform comprises a definition of a metric. 3. The method of claim 1, wherein configuring a plurality of objects is selected form a group consisting of a customer, a vendor, a person, a contract, and a desired outcome. 4. The method of claim 1, wherein the event data is received at an event queue and ingested into an immutable log. 5. The method of claim 1, wherein filtering events based at least in part on a desired outcome of the each of a supplier and a buyer comprises determining declarative events, based at least in part on a user defined criteria. 6. The method of claim 1, wherein creating an object model timeline comprises a pre-defined time bucket. 7. The method of claim 1, wherein the business goal for the each of the supplier and buyer are managed by the buyer. 8. The method of claim 1, wherein determining a state for the desired outcome is ongoing and continuous.
2,400
344,497
16,803,965
2,419
A semiconductor device including fin field-effect transistors, includes a first gate structure extending in a first direction, a second gate structure extending the first direction and aligned with the first gate structure in the first direction, a third gate structure extending in the first direction and arranged in parallel with the first gate structure in a second direction crossing the first direction, a fourth gate structure extending the first direction, aligned with the third gate structure and arranged in parallel with the second gate structure, an interlayer dielectric layer disposed between the first to fourth gate electrodes, and a separation wall made of different material than the interlayer dielectric layer and disposed between the first and third gate structures and the second and fourth gate structures.
1. A semiconductor device including fin field-effect transistors, comprising: a first gate structure extending in a first direction; a second gate structure extending the first direction and aligned with the first gate structure in the first direction; a third gate structure extending in the first direction and arranged in parallel with the first gate structure in a second direction crossing the first direction; a fourth gate structure extending in the first direction; aligned with the third gate structure and arranged in parallel with the second gate structure; an interlayer dielectric layer disposed between the first to fourth gate electrodes; and a separation wall made of different material than the interlayer dielectric layer and disposed between the first and third gate structures and the second and fourth gate structures. 2. The semiconductor device of claim 1, wherein the separation wall is in contact with the first to fourth gate structures and is in contact with no gate structure other than the first to fourth gate structures. 3. The semiconductor device of claim 1, wherein: the separation wall includes a core portion and side layers disposed on side faces in the second direction of the core portion, and a material forming a core portion of the separation wall is different from a material forming the side layers. 4. The semiconductor device of claim 3, wherein the core portion of the separation wall is made of a silicon nitride based material and the side layers are made of silicon oxide. 5. The semiconductor device of claim 3, wherein side faces in the first direction of the separation wall are in contact with a gate dielectric layer of each of the first to fourth gate structures. 6. The semiconductor device of claim 3, wherein: a bottom layer is provided under a bottom portion of the separation wall, and a material forming the bottom layer is the same as the material forming the side layers. 7. The semiconductor device of claim 1, wherein: each of the first to fourth gate structures includes gate sidewall spacers, and the gate sidewall spacers are in contact with the separation wall. 8. The semiconductor device of claim 1, wherein: the first to fourth gate structures are disposed on an upper surface of an isolation insulating layer, and a bottom of the separation wall is located below the upper surface of the isolation insulating layer. 9. The semiconductor device of claim 1, wherein: the first gate structure has a first end and a second end in the first direction, the first end of the first gate structure is in contact with the separation wall, and the second end of the first gate structure is in contact with an interlayer dielectric layer different from the separation wall. 10. The semiconductor device of claim 1, wherein ends of the separation wall penetrate into the interlayer dielectric layer. 11. The semiconductor device of claim 1, wherein each of the first to fourth gate structures is disposed over two fin structures extending in the second direction. 12. A semiconductor device, comprising: a plurality of fin structures extending in a first direction and arranged in a second direction crossing the first direction; a plurality of gate structures extending in the second direction and arranged in the first direction; and a plurality of separation walls separating one pair of gate structures and another pair of gate structures, wherein the plurality of separation walls are arranged in a staggered manner. 13. The semiconductor device of claim 12, wherein a pitch of plurality of the separation walls along a line extending in the second direction is twice a pitch of the plurality of fin structures. 14. The semiconductor device of claim 12, wherein each of the plurality of separation walls is in contact with the one pair of gate structures and the another pair of gate structures and is in contact with no gate structure other than one pair of gate structures and the another pair of gate structures. 15. The semiconductor device of claim 14, further comprising an end separation wall having one side and another side, wherein the one side is in contact with a pair of gate structures and the another side is in contact with an interlayer dielectric layer. 16-20. (canceled) 21. A semiconductor device including fin field-effect transistors, comprising: a first gate structure extending in a first direction; a second gate structure extending the first direction and aligned with the first gate structure in the first direction; a third gate structure extending in the first direction and arranged in parallel with the first gate structure in a second direction crossing the first direction; a fourth gate structure extending in the first direction, aligned with the third gate structure and arranged in parallel with the second gate structure; a separation wall including silicon nitride and extending in the second direction to separate the first and third gate structures and to separate the second and fourth gate structures. 22. The semiconductor device of claim 21, wherein the separation wall has a rectangular body portion and two semi-oval or semi-circular end portions in plan view. 23. The semiconductor device of claim 21, further comprising: a fifth gate structure extending in the first direction, which is a closest gate structure in the second direction to the first and the third gate structures; and a sixth gate structure extending in the first direction, which is a closest gate structure in the second direction to the second and the fourth gate structures, wherein: the fifth and sixth gate structures are arranged such that the first, second, third and fourth gate structures and the separation wall are disposed between the fifth and sixth gate structures; and the fifth and sixth gate structures are separated from the separation wall. 24. The semiconductor device of claim 23, further comprising: an interlayer dielectric layer disposed between the first to fourth gate electrodes, wherein the fifth and sixth gate structures are separated from the separation wall by the interlayer dielectric layer. 25. The semiconductor device of claim 21, wherein: the separation wall includes a core portion and side layers disposed on side faces in the second direction of the core portion, and the core portion is made of the silicon nitride, and the side layers are made of silicon oxide.
A semiconductor device including fin field-effect transistors, includes a first gate structure extending in a first direction, a second gate structure extending the first direction and aligned with the first gate structure in the first direction, a third gate structure extending in the first direction and arranged in parallel with the first gate structure in a second direction crossing the first direction, a fourth gate structure extending the first direction, aligned with the third gate structure and arranged in parallel with the second gate structure, an interlayer dielectric layer disposed between the first to fourth gate electrodes, and a separation wall made of different material than the interlayer dielectric layer and disposed between the first and third gate structures and the second and fourth gate structures.1. A semiconductor device including fin field-effect transistors, comprising: a first gate structure extending in a first direction; a second gate structure extending the first direction and aligned with the first gate structure in the first direction; a third gate structure extending in the first direction and arranged in parallel with the first gate structure in a second direction crossing the first direction; a fourth gate structure extending in the first direction; aligned with the third gate structure and arranged in parallel with the second gate structure; an interlayer dielectric layer disposed between the first to fourth gate electrodes; and a separation wall made of different material than the interlayer dielectric layer and disposed between the first and third gate structures and the second and fourth gate structures. 2. The semiconductor device of claim 1, wherein the separation wall is in contact with the first to fourth gate structures and is in contact with no gate structure other than the first to fourth gate structures. 3. The semiconductor device of claim 1, wherein: the separation wall includes a core portion and side layers disposed on side faces in the second direction of the core portion, and a material forming a core portion of the separation wall is different from a material forming the side layers. 4. The semiconductor device of claim 3, wherein the core portion of the separation wall is made of a silicon nitride based material and the side layers are made of silicon oxide. 5. The semiconductor device of claim 3, wherein side faces in the first direction of the separation wall are in contact with a gate dielectric layer of each of the first to fourth gate structures. 6. The semiconductor device of claim 3, wherein: a bottom layer is provided under a bottom portion of the separation wall, and a material forming the bottom layer is the same as the material forming the side layers. 7. The semiconductor device of claim 1, wherein: each of the first to fourth gate structures includes gate sidewall spacers, and the gate sidewall spacers are in contact with the separation wall. 8. The semiconductor device of claim 1, wherein: the first to fourth gate structures are disposed on an upper surface of an isolation insulating layer, and a bottom of the separation wall is located below the upper surface of the isolation insulating layer. 9. The semiconductor device of claim 1, wherein: the first gate structure has a first end and a second end in the first direction, the first end of the first gate structure is in contact with the separation wall, and the second end of the first gate structure is in contact with an interlayer dielectric layer different from the separation wall. 10. The semiconductor device of claim 1, wherein ends of the separation wall penetrate into the interlayer dielectric layer. 11. The semiconductor device of claim 1, wherein each of the first to fourth gate structures is disposed over two fin structures extending in the second direction. 12. A semiconductor device, comprising: a plurality of fin structures extending in a first direction and arranged in a second direction crossing the first direction; a plurality of gate structures extending in the second direction and arranged in the first direction; and a plurality of separation walls separating one pair of gate structures and another pair of gate structures, wherein the plurality of separation walls are arranged in a staggered manner. 13. The semiconductor device of claim 12, wherein a pitch of plurality of the separation walls along a line extending in the second direction is twice a pitch of the plurality of fin structures. 14. The semiconductor device of claim 12, wherein each of the plurality of separation walls is in contact with the one pair of gate structures and the another pair of gate structures and is in contact with no gate structure other than one pair of gate structures and the another pair of gate structures. 15. The semiconductor device of claim 14, further comprising an end separation wall having one side and another side, wherein the one side is in contact with a pair of gate structures and the another side is in contact with an interlayer dielectric layer. 16-20. (canceled) 21. A semiconductor device including fin field-effect transistors, comprising: a first gate structure extending in a first direction; a second gate structure extending the first direction and aligned with the first gate structure in the first direction; a third gate structure extending in the first direction and arranged in parallel with the first gate structure in a second direction crossing the first direction; a fourth gate structure extending in the first direction, aligned with the third gate structure and arranged in parallel with the second gate structure; a separation wall including silicon nitride and extending in the second direction to separate the first and third gate structures and to separate the second and fourth gate structures. 22. The semiconductor device of claim 21, wherein the separation wall has a rectangular body portion and two semi-oval or semi-circular end portions in plan view. 23. The semiconductor device of claim 21, further comprising: a fifth gate structure extending in the first direction, which is a closest gate structure in the second direction to the first and the third gate structures; and a sixth gate structure extending in the first direction, which is a closest gate structure in the second direction to the second and the fourth gate structures, wherein: the fifth and sixth gate structures are arranged such that the first, second, third and fourth gate structures and the separation wall are disposed between the fifth and sixth gate structures; and the fifth and sixth gate structures are separated from the separation wall. 24. The semiconductor device of claim 23, further comprising: an interlayer dielectric layer disposed between the first to fourth gate electrodes, wherein the fifth and sixth gate structures are separated from the separation wall by the interlayer dielectric layer. 25. The semiconductor device of claim 21, wherein: the separation wall includes a core portion and side layers disposed on side faces in the second direction of the core portion, and the core portion is made of the silicon nitride, and the side layers are made of silicon oxide.
2,400
344,498
16,803,956
2,419
Aspects of the present disclosure relate generally to methods and apparatus of processing transparent substrates, such as glass substrates. In one implementation, a film stack for optical devices includes a glass substrate including a first surface and a second surface. The film stack includes a device function layer formed on the first surface, a hard mask layer formed on the device function layer, and a substrate recognition layer formed on the hard mask layer. The hard mask layer includes one or more of chromium, ruthenium, or titanium nitride. The film stack includes a backside layer formed on the second surface. The backside layer formed on the second surface includes one or more of a conductive layer or an oxide layer.
1. A film stack for optical devices, comprising: a glass substrate comprising a first surface and a second surface, the second surface opposing the first surface and the first surface being disposed above the second surface; a device function layer formed on the first surface; a hard mask layer formed on the device function layer, the hard mask layer comprising one or more of chromium, ruthenium, or titanium nitride; a substrate recognition layer formed on the hard mask layer; and a backside layer formed on the second surface, the backside layer comprising one or more of a conductive layer or an oxide layer. 2. The film stack of claim 1, wherein the substrate recognition layer comprises silicon. 3. The film stack of claim 2, wherein the device function layer comprises one or more of titanium dioxide or niobium monoxide. 4. The film stack of claim 3, wherein the hard mask layer comprises a thickness within a range of 10 nm to 400 nm. 5. The film stack of claim 4, wherein: the device function layer comprises a thickness within a range of 20 nm to 500 nm; and the substrate recognition layer comprises a thickness within a range of 10 nm to 200 nm. 6. The film stack of claim 3, wherein the backside layer formed on the second surface comprises one or more of silicon or silicon oxide. 7. The film stack of claim 6, wherein the backside layer comprises a thickness within a range of 10 nm to 600 nm. 8. A method of processing a film stack for optical devices, comprising: providing the film stack, the film stack comprising: a glass substrate comprising a first surface and a second surface, the second surface opposing the first surface and the first surface being disposed above the second surface, a plurality of layers comprising: a device function layer formed on the first surface, a hard mask layer formed on the device function layer, the hard mask layer comprising one or more of chromium, ruthenium, or titanium nitride, a substrate recognition layer formed on the hard mask layer, and a backside layer formed on the second surface, the backside layer comprising one or more of a conductive layer or an oxide layer; recognizing the substrate recognition layer of the plurality of layers; patterning the film stack to form a tri-layer lithography structure on the plurality of layers; and etching the tri-layer lithography structure and the plurality of layers to form a first plurality of structures on the first surface of the glass substrate and a second plurality of structures stacked on the first plurality of structures. 9. The method of claim 8, wherein the etching the plurality of layers comprises selectively etching the device function layer formed on the first surface of the glass substrate relative to the second plurality of structures, the etching comprises binary etching, and the binary etching comprises reactive ion etching. 10. The method of claim 8, further comprising, prior to the patterning, aligning the film stack relative to a lithography system using one or more alignment marks formed on the hard mask layer. 11. The method of claim 8, wherein the etching the plurality of layers comprises selectively etching the device function layer formed on the first surface of the glass substrate relative to the second plurality of structures, and the etching comprises angled etching. 12. The method of claim 11, wherein the angled etching comprises physical ion bombardment. 13. The method of claim 8, wherein the first plurality of structures comprise one or more of titanium dioxide or niobium monoxide. 14. The method of claim 13, wherein the backside layer formed on the second surface comprises one or more of silicon or silicon oxide. 15. The method of claim 14, wherein the second plurality of structures comprise a thickness within a range of 10 nm to 400 nm. 16. The method of claim 8, wherein: the tri-layer lithography structure comprises: a first layer formed on the substrate recognition layer, a second layer formed on the first layer, and a plurality of photoresist structures formed on the second layer. 17. The method of claim 16, wherein the etching the tri-layer lithography structure and the plurality of layers comprises: etching the plurality of photoresist structures, portions of the first layer aligned vertically with the photoresist structures, portions of the second layer aligned vertically with the photoresist structures, and portions of the substrate recognition layer aligned vertically with the photoresist structures at a first etch rate; and etching portions of the first layer aligned vertically between the photoresist structures, portions of the second layer aligned vertically between the photoresist structures, and portions of the substrate recognition layer aligned vertically between the photoresist structures at a second etch rate that is different than the first etch rate. 18. The method of claim 17, wherein the second etch rate is a ratio of 2:1 relative to the first etch rate. 19. A film stack for optical devices, comprising: a glass substrate comprising a first surface and a second surface, the second surface opposing the first surface and the first surface being disposed above the second surface; a plurality of stacks formed on the first surface, each stack of the plurality of stacks comprising: a first plurality of structures formed on the first surface of the glass substrate, and a second plurality of structures stacked on the first plurality of structures, wherein one or more of the first plurality of structures or the second plurality of structures comprises one or more of chromium, ruthenium, or titanium nitride; and a backside layer formed on the second surface of the glass substrate. 20. The film stack of claim 19, wherein each structure of the second plurality of structures comprises a first angled side surface and a second angled side surface.
Aspects of the present disclosure relate generally to methods and apparatus of processing transparent substrates, such as glass substrates. In one implementation, a film stack for optical devices includes a glass substrate including a first surface and a second surface. The film stack includes a device function layer formed on the first surface, a hard mask layer formed on the device function layer, and a substrate recognition layer formed on the hard mask layer. The hard mask layer includes one or more of chromium, ruthenium, or titanium nitride. The film stack includes a backside layer formed on the second surface. The backside layer formed on the second surface includes one or more of a conductive layer or an oxide layer.1. A film stack for optical devices, comprising: a glass substrate comprising a first surface and a second surface, the second surface opposing the first surface and the first surface being disposed above the second surface; a device function layer formed on the first surface; a hard mask layer formed on the device function layer, the hard mask layer comprising one or more of chromium, ruthenium, or titanium nitride; a substrate recognition layer formed on the hard mask layer; and a backside layer formed on the second surface, the backside layer comprising one or more of a conductive layer or an oxide layer. 2. The film stack of claim 1, wherein the substrate recognition layer comprises silicon. 3. The film stack of claim 2, wherein the device function layer comprises one or more of titanium dioxide or niobium monoxide. 4. The film stack of claim 3, wherein the hard mask layer comprises a thickness within a range of 10 nm to 400 nm. 5. The film stack of claim 4, wherein: the device function layer comprises a thickness within a range of 20 nm to 500 nm; and the substrate recognition layer comprises a thickness within a range of 10 nm to 200 nm. 6. The film stack of claim 3, wherein the backside layer formed on the second surface comprises one or more of silicon or silicon oxide. 7. The film stack of claim 6, wherein the backside layer comprises a thickness within a range of 10 nm to 600 nm. 8. A method of processing a film stack for optical devices, comprising: providing the film stack, the film stack comprising: a glass substrate comprising a first surface and a second surface, the second surface opposing the first surface and the first surface being disposed above the second surface, a plurality of layers comprising: a device function layer formed on the first surface, a hard mask layer formed on the device function layer, the hard mask layer comprising one or more of chromium, ruthenium, or titanium nitride, a substrate recognition layer formed on the hard mask layer, and a backside layer formed on the second surface, the backside layer comprising one or more of a conductive layer or an oxide layer; recognizing the substrate recognition layer of the plurality of layers; patterning the film stack to form a tri-layer lithography structure on the plurality of layers; and etching the tri-layer lithography structure and the plurality of layers to form a first plurality of structures on the first surface of the glass substrate and a second plurality of structures stacked on the first plurality of structures. 9. The method of claim 8, wherein the etching the plurality of layers comprises selectively etching the device function layer formed on the first surface of the glass substrate relative to the second plurality of structures, the etching comprises binary etching, and the binary etching comprises reactive ion etching. 10. The method of claim 8, further comprising, prior to the patterning, aligning the film stack relative to a lithography system using one or more alignment marks formed on the hard mask layer. 11. The method of claim 8, wherein the etching the plurality of layers comprises selectively etching the device function layer formed on the first surface of the glass substrate relative to the second plurality of structures, and the etching comprises angled etching. 12. The method of claim 11, wherein the angled etching comprises physical ion bombardment. 13. The method of claim 8, wherein the first plurality of structures comprise one or more of titanium dioxide or niobium monoxide. 14. The method of claim 13, wherein the backside layer formed on the second surface comprises one or more of silicon or silicon oxide. 15. The method of claim 14, wherein the second plurality of structures comprise a thickness within a range of 10 nm to 400 nm. 16. The method of claim 8, wherein: the tri-layer lithography structure comprises: a first layer formed on the substrate recognition layer, a second layer formed on the first layer, and a plurality of photoresist structures formed on the second layer. 17. The method of claim 16, wherein the etching the tri-layer lithography structure and the plurality of layers comprises: etching the plurality of photoresist structures, portions of the first layer aligned vertically with the photoresist structures, portions of the second layer aligned vertically with the photoresist structures, and portions of the substrate recognition layer aligned vertically with the photoresist structures at a first etch rate; and etching portions of the first layer aligned vertically between the photoresist structures, portions of the second layer aligned vertically between the photoresist structures, and portions of the substrate recognition layer aligned vertically between the photoresist structures at a second etch rate that is different than the first etch rate. 18. The method of claim 17, wherein the second etch rate is a ratio of 2:1 relative to the first etch rate. 19. A film stack for optical devices, comprising: a glass substrate comprising a first surface and a second surface, the second surface opposing the first surface and the first surface being disposed above the second surface; a plurality of stacks formed on the first surface, each stack of the plurality of stacks comprising: a first plurality of structures formed on the first surface of the glass substrate, and a second plurality of structures stacked on the first plurality of structures, wherein one or more of the first plurality of structures or the second plurality of structures comprises one or more of chromium, ruthenium, or titanium nitride; and a backside layer formed on the second surface of the glass substrate. 20. The film stack of claim 19, wherein each structure of the second plurality of structures comprises a first angled side surface and a second angled side surface.
2,400
344,499
16,803,951
2,419
The present invention relates to a hydraulic system comprising a first actuator, a first variable displacement pump fluidly connected to the first actuator via a first circuit and adapted to drive the first actuator. The system further comprises a second actuator and a second pump fluidly connectable to the second actuator via a second circuit and adapted to drive the second actuator, wherein the second pump is fluidly connectable to the first actuator via a first control valve, and wherein the second pump is fluidly connectable to the second actuator via a second control valve.
1. A hydraulic system comprising: a first actuator; a first variable displacement pump fluidly connected to the first actuator via a first circuit and adapted to drive the first actuator; a second actuator; a second pump fluidly connectable to the second actuator via a second circuit and adapted to drive the second actuator, wherein the second pump is fluidly connectable to the first actuator via a first control valve, and wherein the second pump is fluidly connectable to the second actuator via a second control valve, wherein the second pump is also arranged to act as a charge pump maintaining the hydraulic system at an elevated fluid pressure. 2. The hydraulic system of claim 1, wherein the first circuit is a closed loop circuit. 3. The hydraulic system of claim 1, wherein the second pump is a variable displacement pump. 4. The hydraulic system of claim 1, wherein the first pump is directly connected or connectable to the first actuator, and wherein the first control valve is a first proportional control valve adapted to variably restrict a fluid flow from the second pump provided to the first actuator. 5. The hydraulic system of claim 4, wherein the first proportional control valve is a directional, proportional spool valve, preferably a 4/3 spool valve 6. The hydraulic system of claim 4, wherein the first proportional control valve is an independent metering valve. 7. The hydraulic system of claim 6, wherein the independent metering valve is connected to a first chamber of the first actuator via a first fluid line and to a second chamber of the first actuator via a second fluid line, wherein a first pressure sensor is provided in the first fluid line and a second pressure sensor is provided in the second fluid line. 8. The hydraulic system of claim 7, wherein the hydraulic system comprises a control unit adapted to receive pressure information from the first and second pressure sensors, and wherein the control unit is configured to control the independent metering valve to connect one of the first or second chamber to a fluid return line, depending on the pressure information. 9. The hydraulic system of claim 1, wherein the second control valve is a second proportional control valve adapted to variably restrict the second fluid pressure of the second pump provided to the second actuator. 10. The hydraulic system of claim 9, wherein the second proportional control valve is a directional, proportional spool valve, preferably a 4/3 spool valve. 11. The hydraulic system of claim 1, further comprising a third actuator and a third pump connectable to the third actuator via a third circuit and adapted to drive the third actuator. 12. The hydraulic system of claim 11, wherein the second pump is fluidly connectable to the third actuator via a third control valve. 13. The hydraulic system of claim 12, wherein the third pump is directly connected or connectable to the third actuator, and wherein the system comprises a third proportional control valve adapted to variably restrict a fluid flow from the second pump provided to the third actuator. 14. The hydraulic system of claim 13, wherein the third proportional control valve is a directional, proportional spool valve, preferably a 4/3 spool valve. 15. The hydraulic system of claim 1, wherein the first pump is configured as a bidirectional variable displacement pump and the second pump is configured as a unidirectional pump, and wherein the first and second control valves are directional control valves. 16. The hydraulic system of claim 15, wherein the first pump comprises a first port connected or selectively connectable to a first chamber of the first actuator and a second port connected or selectively connectable to a second chamber of the first actuator. 17. The hydraulic system of claim 15, wherein the second circuit is an open circuit. 18. The hydraulic system of claim 17, wherein the second pump comprises a first port selectively connectable to the first or second chamber of the first actuator via the first control valve and a second port connected to a hydraulic fluid reservoir. 19. The hydraulic system of claim 18, wherein the first port of the second pump is connected to the hydraulic fluid reservoir via a bypass-valve, preferably a variable pressure relief valve. 20. A construction machine, comprising the hydraulic system of claim 1.
The present invention relates to a hydraulic system comprising a first actuator, a first variable displacement pump fluidly connected to the first actuator via a first circuit and adapted to drive the first actuator. The system further comprises a second actuator and a second pump fluidly connectable to the second actuator via a second circuit and adapted to drive the second actuator, wherein the second pump is fluidly connectable to the first actuator via a first control valve, and wherein the second pump is fluidly connectable to the second actuator via a second control valve.1. A hydraulic system comprising: a first actuator; a first variable displacement pump fluidly connected to the first actuator via a first circuit and adapted to drive the first actuator; a second actuator; a second pump fluidly connectable to the second actuator via a second circuit and adapted to drive the second actuator, wherein the second pump is fluidly connectable to the first actuator via a first control valve, and wherein the second pump is fluidly connectable to the second actuator via a second control valve, wherein the second pump is also arranged to act as a charge pump maintaining the hydraulic system at an elevated fluid pressure. 2. The hydraulic system of claim 1, wherein the first circuit is a closed loop circuit. 3. The hydraulic system of claim 1, wherein the second pump is a variable displacement pump. 4. The hydraulic system of claim 1, wherein the first pump is directly connected or connectable to the first actuator, and wherein the first control valve is a first proportional control valve adapted to variably restrict a fluid flow from the second pump provided to the first actuator. 5. The hydraulic system of claim 4, wherein the first proportional control valve is a directional, proportional spool valve, preferably a 4/3 spool valve 6. The hydraulic system of claim 4, wherein the first proportional control valve is an independent metering valve. 7. The hydraulic system of claim 6, wherein the independent metering valve is connected to a first chamber of the first actuator via a first fluid line and to a second chamber of the first actuator via a second fluid line, wherein a first pressure sensor is provided in the first fluid line and a second pressure sensor is provided in the second fluid line. 8. The hydraulic system of claim 7, wherein the hydraulic system comprises a control unit adapted to receive pressure information from the first and second pressure sensors, and wherein the control unit is configured to control the independent metering valve to connect one of the first or second chamber to a fluid return line, depending on the pressure information. 9. The hydraulic system of claim 1, wherein the second control valve is a second proportional control valve adapted to variably restrict the second fluid pressure of the second pump provided to the second actuator. 10. The hydraulic system of claim 9, wherein the second proportional control valve is a directional, proportional spool valve, preferably a 4/3 spool valve. 11. The hydraulic system of claim 1, further comprising a third actuator and a third pump connectable to the third actuator via a third circuit and adapted to drive the third actuator. 12. The hydraulic system of claim 11, wherein the second pump is fluidly connectable to the third actuator via a third control valve. 13. The hydraulic system of claim 12, wherein the third pump is directly connected or connectable to the third actuator, and wherein the system comprises a third proportional control valve adapted to variably restrict a fluid flow from the second pump provided to the third actuator. 14. The hydraulic system of claim 13, wherein the third proportional control valve is a directional, proportional spool valve, preferably a 4/3 spool valve. 15. The hydraulic system of claim 1, wherein the first pump is configured as a bidirectional variable displacement pump and the second pump is configured as a unidirectional pump, and wherein the first and second control valves are directional control valves. 16. The hydraulic system of claim 15, wherein the first pump comprises a first port connected or selectively connectable to a first chamber of the first actuator and a second port connected or selectively connectable to a second chamber of the first actuator. 17. The hydraulic system of claim 15, wherein the second circuit is an open circuit. 18. The hydraulic system of claim 17, wherein the second pump comprises a first port selectively connectable to the first or second chamber of the first actuator via the first control valve and a second port connected to a hydraulic fluid reservoir. 19. The hydraulic system of claim 18, wherein the first port of the second pump is connected to the hydraulic fluid reservoir via a bypass-valve, preferably a variable pressure relief valve. 20. A construction machine, comprising the hydraulic system of claim 1.
2,400