Abstract:
Technologies are generally described for an auction in a game. In some examples, an item auction system may include a playing pattern analysis unit configured to analyze a playing pattern of a player of a particular game, a character level prediction unit configured to predict level advancement for a game character of the player based at least in part on the analyzed playing pattern, and an item recommendation unit configured to recommend one or more game items to the player from among multiple game items in one or more auctions based at least in part on the predicted level advancement and time remaining in respective ones of the one or more auctions.
Abstract:
Various embodiments of a semi-joint scheduling algorithm for carrier aggregation in an LTE-Advanced system are provided. The proposed semi-joint scheduling algorithm combines the advantages of independent scheduling and joint scheduling while avoiding the respective shortcomings, and provides a technical foundation for a wide adoption of the carrier aggregation technology. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
Abstract:
Methods of forming transition metal dichalcogenide aerogels are provided. Some methods include adding at least one solvent to one or more two-dimensional transition metal dichalcogenide sheets to form a transition metal dichalcogenide solution and freeze drying the transition metal dichalcogenide solution to form frozen transition metal dichalcogenide. The methods also include heating the frozen transition metal dichalcogenide to form a transition metal dichalcogenide aerogel.
Abstract:
An antenna relay system for facilitating wireless communication between mobile terminals on a high-speed rail vehicle and stationary base stations with substantially reduced Doppler shift effects comprises matched traveling wave directional antennas mounted to a high-speed rail vehicle and positioned collinearly alongside the railway. Both antennas continually transmit and receive at a fixed angle relative to the motion of the train so as to circumvent the Doppler shift. The signal transmitted or received by the stationary antenna is conducted to a nearest node for communication with an access network.
Abstract:
Technologies related to shared secret identification for secure communication are generally described. In some examples, devices may exchange hashes, such as file deduplication hashes, to identify a matching hash. The identified matching hash represents a shared data item which may be used as a shared secret to encrypt and/or decrypt subsequent secure communications between the devices. Each device retrieves the shared data item from its respective secure memory and may use the shared data item to encrypt and/or decrypt subsequent secure communications. An eavesdropper may observe the hash exchange, but will not be able to decrypt the secure communications without access to the shared data item, because hashes may be effectively non-invertible.
Abstract:
Techniques are generally described for an image capture system that may include an image sensor, a flash for providing illumination, a data storage, and a processor operatively associated with the data storage. The processor may be adapted to execute computer implemented instructions to pre-store one or more image capture device characteristics in the data storage, acquire data in a pre-capture phase, model shadow effects based on either or both of the pre-stored data and the acquired data, modify one or more image capture device settings based on the modeled shadow effects, and record image data with the image sensor. Illumination may be provided substantially coincident with recording of the image data.
Abstract:
Technologies are provided for locally installing remotely-served API instances. In some examples, a scale-out service may receive a request to provide an installation of a remotely-served API at a particular datacenter. In response to a determination by the scale-out service that a local instance of the remotely-served API can be installed at that datacenter, the scale-out service may install the local instance and route requests to that API from the datacenter to the local instance instead of the remotely-served API.
Abstract:
Technologies are generally described for manufacturing an optical device by attaching a light-emitting element to an optical element through a resin. In various examples, a method is described, where a substrate is provided to have a through-hole at a position in the substrate where an optical element is to be mounted. A resin in liquid state may be injected into the through-hole in the substrate. Further, an optical element having a light-emitting portion may be mounted on the substrate such that a center of the tight-emitting portion is self-aligned with a center of the through-hole due to a surface tension of the resin in liquid state. The resin may be cured such that the optical element is fixed to the substrate.
Abstract:
Technologies are generally described herein for linear programming based decoding for memory devices. In some examples, a cell threshold voltage level of a memory cell is detected. An interference voltage level of an interference cell that interferes with the memory cell can be determined. The cell threshold voltage level can be decoded in accordance with a set of beliefs to determine the value of the memory cell. The set of beliefs can include a minimization of an objective function of a linear program representing inter-cell interference between the memory cell and the interference cell.
Abstract:
Technologies are generally described for systems and methods effective to detect an alteration in augmented reality. A processor may receive a real image that corresponds to a real object and may receive augmented reality instructions to generate a virtual object. The processor may determine that the virtual object at least partially obscures the real object when the virtual object is rendered on a display. The processor may, upon determining that the virtual object at least partially obscures the real object when the virtual object is rendered on the display, simulate an activity on the real object to produce a first activity simulation and simulate the activity on the virtual object to produce a second activity simulation. The processor may determine a difference between the first and the second activity simulation and modify the augmented reality instructions to generate a modified virtual object in response to the determination of the difference.