Abstract:
Technologies are generally described for a speech recognition scheme. In some examples, a method performed under control of a speech recognition system may include receiving, from a first device, first data including a first signal captured by the first device, first location information of the first device, and first time information corresponding to the captured first signal; cancelling first noise from the captured first signal based at least in part on the first location information and the first time information, and estimating a first voice signal of a first user of the first device, wherein the first noise is associated with a second voice signal of a second user of a second device located adjacent to the first device; and translating the first voice signal into a first command for the first device.
Abstract:
Technologies are generally described for reduction of the characteristic on resistance for a transistor device. In some examples, a transistor device may include a source region, a drain region, an n-type epitaxial region between the source and drain regions, a p-type body region, and a deep p-type trench region formed below the body region. The trench region may be configured to charge compensate the n-type epitaxial region. In other examples, the characteristic on resistance may be reduced by replacing the silicon below the body region with lower resistance conductive material. A backside of a wafer that includes the transistor device may be thinned by using a support or carrier on the front side of the wafer to provide mechanical support, and etching trenches in both the substrate silicon and the epitaxial silicon located below the body region of the transistor device. The trenches may be subsequently filled with conductive material.
Abstract:
Technologies are generally described for an access control scheme for an external device. In some examples, an electronic device may detect the external memory connected to the electronic device; set a security code to enable access to the external memory; receive a request to access the external memory; access the external memory in response to entry of the security code; receive a request to disconnect the external memory; and remove a requirement for entry of the security code to enable access to the external memory.
Abstract:
Technologies are generally provided for a trans-vaginal sling delivery device for deploying a sub-urethral sling to treat urinary incontinence. A delivery tool coupled with an interior of a delivery tube may be advanced through the vagina, and a pointed end of the delivery tube may puncture the vaginal wall. A sub-urethral sling may be attached to the delivery tube, and the sling may be longitudinally wrapped into a reduced delivery profile around the delivery tool within the delivery tube. The delivery tube may include a longitudinal slit opening, and the sling may be deployed from the delivery tool by rotating the delivery tool. Two delivery tubes and delivery tools may be employed to deploy each end of the sling, such that each end of the sling may be anchored on a right and left side of the urethra with a portion of the sling supporting the urethra from beneath.
Abstract:
In a cluster computing environment, multiple computing devices may be configured to share same storage devices to perform different portions of one or more computing tasks. The storage devices may be communicatively coupled to the computing devices via a network so that each of the multiple computing devices may retrieve data from or write data to the shard storage devices.
Abstract:
Technologies are generally described for systems, devices and methods effective to utilize a solid state memory device. A memory device may include one or more input/output ports effective to receive data at, and facilitate transfer from, the memory device. The memory device may further include a memory controller. The memory controller may be effective to control access to data stored in the memory device. The memory device may further include two or more flash chips effective to store data in the memory device. The memory device may further include a crossbar switch. The crossbar switch may be coupled between the one or more input/output ports and the two or more flash chips. The crossbar switch may be effective to enable the one or more input/output ports to access the two or more flash chips through the memory controller.
Abstract:
Food products having portions of a dried deseeded coffee cherry are described, as well as components thereof and methods of forming. The food product may include one or more portions of a dried deseeded coffee cherry and a corn-derived ingredient.
Abstract:
Embodiments of the present disclosure may generally relate to methods for processing a response matrix of a communication system. One example method may comprise dividing the response matrix into a plurality of clusters. The number of the clusters is associated with the number of subcarriers of the communication system, and the clusters are indexed in sequence as even-indexed clusters and odd-indexed clusters. The method may further comprise estimating data transmitted by a first set of transmit antennas of the communication system through a first subcarrier and a second subcarrier of the subcarriers associated with a first even-indexed cluster. The method may further comprise modifying a first receive vector of the communication system based on the estimated data transmitted by the first set of transmit antennas as a second receive vector of the communication system.
Abstract:
An example method to determine a quality-of-experience (QoE) metric for a network communication includes receiving a media signal from the network communication, wherein the media signal includes a voice component, extracting an experience indicator from the voice component, wherein the experience indicator is a voice feature descriptive of a service quality of the network communication, evaluating the experience indicator, retrieving a quality-of-service (QoS) metric if the evaluated experience indicator reflects the service quality of the network possibly being subpar, and determining the QoE metric for the network communication based on the evaluated experience indicator and the retrieved QoS metric for the network communication.
Abstract:
Technologies are generally described for methods and systems effective to generate a composite image. The methods may include receiving first image data that includes object data corresponding to an object and receiving second image data that includes obscuring data. The obscuring data, if displayed on a display, may obscure at least a portion of the. The methods may also include identifying a first region that may include the object data, in the first image data. The methods may also include identifying a second region, that may include the obscuring data, in the second image data. The methods may also include replacing at least part of the second region with at least part of the first region to generate the composite image data that may include at least some of the object data. The methods may also include displaying the composite image on a display.