Method for scheduling single-arm cluster tools with wafer revisiting and residency time constraints
    41.
    发明授权
    Method for scheduling single-arm cluster tools with wafer revisiting and residency time constraints 有权
    用于调整具有晶片重新访问和驻留时间约束的单臂集群工具的方法

    公开(公告)号:US09223307B1

    公开(公告)日:2015-12-29

    申请号:US14639980

    申请日:2015-03-05

    Abstract: In semiconductor manufacturing, there are wafer fabrication processes in cluster tools that need a wafer to visit some processing steps for more than once, leading to a revisiting process. Also, wafers may be subject to wafer residency time constraints. By considering atomic layer deposition (ALD) as a typical wafer revisiting process, this invention studies the challenging scheduling problem of single-arm cluster tools for the ALD process with wafer residency time constraints. By recognizing that the key to this problem is to schedule the robot tasks, the present invention presents different robot task sequencing strategies. With these strategies for different cases, the present invention performs the schedulability analysis and derives the schedulability conditions for such tools for the first time. If schedulable, the present invention proposes scheduling algorithms to obtain an optimal schedule efficiently. Illustrative examples are given to show the application of the proposed concepts and approach.

    Abstract translation: 在半导体制造中,在集群工具中存在晶片制造工艺,其需要晶片多次访问一些处理步骤,导致重新审视过程。 此外,晶片可能受到晶片驻留时间限制。 通过考虑原子层沉积(ALD)作为典型的晶片再访问过程,本发明研究了具有晶圆驻留时间约束的ALD工艺的单臂簇工具的具有挑战性的调度问题。 通过认识到这个问题的关键是计划机器人任务,本发明提出了不同的机器人任务排序策略。 利用这些针对不同情况的策略,本发明首次执行可调度性分析并得出这些工具的可调度条件。 如果可调度,本发明提出调度算法以有效地获得最佳调度。 给出说明性的例子来说明所提出的概念和方法的应用。

    Method for predicting and detecting network intrusion in a computer network
    43.
    发明授权
    Method for predicting and detecting network intrusion in a computer network 有权
    在计算机网络中预测和检测网络入侵的方法

    公开(公告)号:US09148439B2

    公开(公告)日:2015-09-29

    申请号:US14201942

    申请日:2014-03-10

    Abstract: A method of detecting an internet attack against a computing device is disclosed. The method of detecting an internet attack against a computing device comprising the steps of receiving a plurality of incoming network packets; extracting a plurality of incoming feature packets based on the plurality of incoming network packets; predicting a predicted incoming feature packet based on the plurality of incoming feature packets; obtaining a first classification data based on one of the incoming feature packets using a first classifier; obtaining a second classification data based on the predicted incoming feature packet by using a second classifier; and performing at least one remedy action if the first classification data or the second classification data identifies the internet intrusion attack; wherein each of the plurality of incoming feature packets and the predicted incoming feature packet comprise a plurality of incoming features and a plurality of predicted features respectively.

    Abstract translation: 公开了一种检测针对计算设备的因特网攻击的方法。 一种检测针对计算设备的因特网攻击的方法,包括以下步骤:接收多个传入网络分组; 基于所述多个传入网络分组来提取多个输入特征分组; 基于所述多个输入特征分组来预测预测的进入特征分组; 使用第一分类器基于所述输入特征分组之一获得第一分类数据; 通过使用第二分类器基于预测的进入特征分组获得第二分类数据; 以及如果所述第一分类数据或所述第二分类数据识别所述互联网入侵攻击,则执行至少一种补救措施; 其中所述多个输入特征分组和所述预测输入特征分组中的每一个分别包括多个输入特征和多个预测特征。

    METHOD, SYSTEM AND DEVICE FOR COPY-PASTE TAMPERED IMAGE DETECTION

    公开(公告)号:US20240169691A1

    公开(公告)日:2024-05-23

    申请号:US18515832

    申请日:2023-11-21

    Abstract: A method for a copy-paste tampered image detection, including: extracting, using a scale-invariant feature transformation algorithm, key points of an image and features corresponding to the key points; constructing, using a gradient hash matching algorithm, a hash table based on the features, and putting the key points into rows corresponding to serial numbers of the hash table; performing a matching operation, using a k-nearest neighbor algorithm, on the key points in each row of the hash table to obtain key point pairs; and clustering and grouping, using a distance clustering filtering algorithm, the key point pairs, and retaining the key point pairs in a cluster group whose number of the key point pairs is greater than a quantity threshold; and marking circles in the image with each key point, in the key point pairs that are retained, as a center and according to a specified radius.

    System, method, computer program and data signal for scheduling at least one physical event

    公开(公告)号:US11263708B2

    公开(公告)日:2022-03-01

    申请号:US15396992

    申请日:2017-01-03

    Abstract: A system and method for scheduling at least one event includes a component module arranged to receive component data regarding a plurality of possible operation decisions, a modelling module arranged to utilise the plurality of operation decisions to construct a Petri net model to simulate a real world system, a scheduling module arranged to utilise the Petri net and variable data regarding the plurality of operation decisions to determine a schedule of events that is feasible subject to a set of predetermined constraints, and an operation module arranged to provide the schedule of events to at least one external device.

    Nucleic Acid Molecules and Uses Thereof

    公开(公告)号:US20210254066A1

    公开(公告)日:2021-08-19

    申请号:US17247265

    申请日:2020-12-06

    Abstract: A method of treating a subject suffering from cancer comprising a step of administering an effective amount of a group of double-stranded RNA molecules to the subject, wherein the RNA molecule is isolated or derived from a bacteria of the genus Escherichia. A method of inhibiting growth or proliferation of cancer cells comprising a step of contacting said cells with said RNA molecule; and a pharmaceutical composition for treating cancer comprising said RNA molecule and a pharmaceutically tolerable excipient. Also a double-stranded RNA molecule and a recombinant vector comprising the double-stranded RNA molecule.

    Method and system for secure encryption

    公开(公告)号:US10985906B2

    公开(公告)日:2021-04-20

    申请号:US15880566

    申请日:2018-01-26

    Abstract: A method executed by a computer system that transmits a multimedia content through a negative-base number. The method includes generating a binary sequence for the multimedia content, converting the binary sequence into a negative-base number, receiving the negative-base number, retrieving a negative base of the negative base number, calculating the binary sequence based on the negative-base number and the negative base, and obtaining the multimedia content based on the binary sequence.

Patent Agency Ranking