Abstract:
A method and a system for processing media messages. The method includes a sending party client generating and sending a media message, wherein the media message carries at least two media contents and marker information indicating a playing relationship between the media contents; a media server receiving the media message sent by the sending party client; and a receiving party client acquiring the media message from the media server and playing the media contents according to the instruction of the marker information. The method and system provide a new media content processing mechanism.
Abstract:
A method of controlling energy consumption in a building includes receiving occupancy data including at least one of occupant request data and occupant schedule data, receiving weather data including at least one of current weather measurement data and weather forecast data, generating an output control signal based on the occupancy data and the weather data, and transmitting the output control signal to a building automation system (BAS) of the building. The occupant request data includes a current request, and the occupant schedule data includes a predicted occupant schedule. The output control signal adjusts a building control device in a zone in the building.
Abstract:
A method including: computing a total cost for a first zone in a building, wherein the total cost is equal to an actual energy cost of the first zone plus a thermal discomfort cost of the first zone; and heuristically optimizing the total cost to identify temperature setpoints for a mechanical heating/cooling system and a start time and an end time of the mechanical heating/cooling system, based on external weather data and occupancy data of the first zone.
Abstract:
A wireless communication device capable of determining its location in an indoor environment is disclosed. In an indoor environment, a wireless communication device may have insufficient access to GNSS satellites or cellular towers to make an accurate determination as to its location. Therefore, the wireless communication device generates a fingerprint map of the environment by estimating its position and scanning multiple positions within the environment for accessible access points and characteristics. The device stores this information in memory, which it can later refer to for determining its current position.
Abstract:
The present invention discloses a method for accessing a storage server of an IM service system and an IM service system. The method comprises: IM client sending registration request message to IM service system using first user identifier; after receiving registration request message, IM service system obtaining other user identifiers associated with the first user identifier, sending registration success response message comprising other user identifiers associated with the first user identifier to IM client; IM storage client sending login request comprising any one of multiple user identifiers to storage server; storage server receiving login request and obtaining other user identifiers associated with the user identifier in login request; the storage server passing identity verification of multiple user identifiers. The problem of repeat login of a user with multiple identifiers is effectively solved when accessing a storage server, the system access efficiency is improved and the user experience is enhanced.
Abstract:
Computation scheduling and allocation for visual communication is described. In one aspect, multiple frames of video data are encoded by allocating for at least a subset of inter-coded frames, on frame-by-frame basis, computational resources to encode the inter-coded frame. To this end, a computational budget to encode a current inter-coded frame is estimated. The estimate is based on the actual computational costs to encode a previous inter-coded frame of video data. Next, sets of operations associated with encoding the current inter-coded frame are analyzed to determine computational resources to implement the operations. If the computational resources exceed the computational budget, complexity of the operations is reduced until the associated computational resources are less than or equal to the computational budget. At this point, the current inter-coded frame is encoded using the operations and the computational budget. This process is repeated for the remaining inter-coded frames of video data.
Abstract:
A Wyner-Ziv coding scheme jointly utilizes multiple side information at the decoder is described. A new probability model is introduced based on an extended turbo decoding trellis, so that the transitional probability is calculated from the probabilities conditioned on multiple side information. The proposed scheme handles multiple side information in a multi-dimensional manner to potentially achieve coding performance better than either selecting one side information or generating a single side information by averaging several side information. When the decoder receives multiple streams of parity bits, the conditional probabilities on the parity bits from the multiple streams all contribute in turbo decoding. The errors existing in some of the streams can be automatically eliminated during the decoding process.
Abstract:
Various embodiments of the invention provide human kinases and phosphatases (KPP) polypeptides and polynucleotides which identify and encode KPP. Embodiments of the invention also provide expression vectors, host cells, antibodies, agonists, and antagonists. Other embodiments provide methods for diagnosing, treating, or preventing disorders associated with aberrant expression of KPP.
Abstract:
Embodiments provide an application layer security proxy that protects substation automation systems. The application layer security proxy inspects a received, inbound data packet at the application layer, and either drops the data packet, forwards the data packet, or processes the data packet rather than dropping it in order to maintain the communications network connection, the later two according to a predefined role-based access control policy. The application layer security proxy calculates a round trip time for each reply to a received, inbound data packet and observes the bandwidth usage from the amount of bytes transmitted. Round trip time and bandwidth usage are used to detect abnormal communication traffic.
Abstract:
A method for compressing a high dynamic range (HDR) texture. A first block of texels of the HDR texture in a red-green-blue (RGB) space may be transformed to a second block of texels in a luminance-chrominance space. The first block may have red values, green values and blue values. The second block may have luminance values and chrominance values. The chrominance values may be based on a sum of the red values, a sum of the green values and a sum of the blue values. The luminance values and the chrominance values may be converted to an 8-bit integer format. The luminance values may be modified to restore a local linearity property to the second block. The second block may be compressed.