Abstract:
A method, system and device for transferring rights adapted to be associated with items from a rights supplier to a rights consumer, including obtaining a set of rights associated with an item, the set of rights including meta-rights specifying derivable rights that can be derived from the meta-; determining whether the rights consumer is entitled to the derivable rights specified by the meta-rights; and deriving at least one right from the derivable rights, if the rights consumer is entitled to the derivable rights specified by the meta-rights, wherein the derived right includes at least one state variable based on the set of rights and used for determining a state of the derived right.
Abstract:
A method of controlling an operation of an induction actuated container cover includes the steps of (a) normally retaining a cover panel of the container cover in a closed position; (b) detecting a target movement of a user by a sensor; (c) generating a first actuating signal to an actuation unit when the sensor detects the target movement of the user; (d) generating an actuation output from the actuation unit to the cover panel of the container cover, wherein the actuation output contains a decelerating and torque enhancing force which moves the cover panel of the container cover at an opened position; (e) pivotally actuating the cover panel of the container cover at the opened position via the actuation output to expose a storage cavity, and (f) generating a second actuating signal to pivotally actuate the cover panel of the container cover back to the closed position.
Abstract:
A method performed by a processor allows an individual to update or maintain a database including a core and an extension. The core contains core tables including general data and the extension contains extension tables including specific data. The core tables and the extension tables have the same primary keys and the specific data are an extension of the general data. The method includes receiving an input from the individual for modifying the database, modifying the core using the received input, and automatically modifying the extension to reflect the modifying of the core.
Abstract:
Systems and methods for reconciling financial transactions are described with respect to a number of embodiments of the present disclosure. In one implementation, among others, a method includes enabling a user to define how different types of financial items are grouped. The grouped financial items are selected from one of a financial statement associated with a first account with a first financial institution and financial data recorded by a customer of the first financial institution. The method also includes enabling the user to set matching criteria for matching financial items of the financial statement with financial items of the customer recorded financial data.
Abstract:
The authenticity of a security document, such as a bank note, is verified by use of a security feature arranged in or on the document, which security feature comprises an antenna arranged to receive EM-radiation from an external energy source; a rectifier arranged to receive electric energy from the antenna and convert it into a rectified current; and an electrochromic display arranged to alter its electrochromic state in response to said rectified current. Hence, a security feature able alter its appearance in response to EM-radiation is provided, which comprises a display that can be given a large variety of two dimensional shapes.
Abstract:
A multi-network exchange system has a first type network (PSTN) and a second type network (Internet) and a multi-network exchange bridge in communication with the first and second type networks for the transfer of electronic information signals (telephone calls) between the first and second type networks. The multi-network exchange bridge apparatus facilitates transfer of electronic information signals to a portable access device or a gateway portal in communication with a node of one of second type networks from the first network. The multi-network exchange bridge has at least one multi-network instantiation device that enables the portable access device to function as a remote extension of the multi-network exchange bridge. A fixed address translation device provides conversion of a first address fixedly describing a node of the first type network to a second address or third address virtually describing nodes of the second type network.
Abstract:
The mainstream jet engine now is the turbo-jet engine. Here in this invention the turbine is replaced by a piston motor. This will increase fuel efficiency and separating the turning parts from the burning parts will benefit maintenance effort. Unlike traditional turbo-jet engine to use turbines to drive fans and compressors, this invention uses a rotary motor driven by high pressure fluid generated by separate working chambers piston engine to drive fans and compressorsSealing is a major issue in engine design. Without proper sealing between moving parts, the working media will loose pressure and the power output will be low. So tradition rotary engine has sealing problems due to its complex movement of pistons. Here a linear movement piston is used when the working media is gas and a rotary piston when the working media is fluid, thus solving the problems with sealing, cooling and lubricating difficulties.This invention uses some techniques developed in the previous inventions by me, application No. 60957442 and 11846550.
Abstract:
A method performed by a processor allows an individual to update or maintain a database including a core and an extension. The core contains core tables including general data and the extension contains extension tables including specific data. The core tables and the extension tables have the same primary keys and the specific data are an extension of the general data. The method includes receiving an input from the individual for modifying the database, modifying the core using the received input, and automatically modifying the extension to reflect the modifying of the core.
Abstract:
A characterized cell library for EDA tools includes one or more mathematical models for each cell, and one or more preconditioning functions (and/or inverse preconditioning functions) for each mathematical model. Each mathematical model represents a performance parameter (e.g., delay, power consumption, noise) or a preconditioned performance parameter of the cell. The preconditioning functions convert an operating parameter (e.g., input slew, output capacitance) associated with the performance parameter into a preconditioned input variable for the mathematical models. In doing so, the preconditioning functions allow for more accurate modeling of complex data relationships without increasing the complexity (e.g., order and number of coefficients) of the mathematical models. Also, because the cell library can be substantially similar to conventional polynomial-based cell libraries except for the inclusion of preconditioning functions, preconditioning does not significantly increase storage requirements and conventional EDA tools can be readily adapted to use the preconditioned cell library.
Abstract:
Shape recognition is performed based on determining whether one or more ink strokes is not part of a shape or a partial shape. Ink strokes are divided into segments and the segments analyzed employing a relative angular distance histogram. The histogram analysis yields stable, incremental, and discriminating featurization results. Neural networks may also be employed along with the histogram analysis to determine complete shapes from partial shape entries and autocomplete suggestions provided to users for conversion of the shape into a known object.