Abstract:
Technologies are generally described for systems, devices and methods effective to identify an individual. In some examples, a microphone may receive sound data such as sound that may be present in a mall. A processor, that may be in communication with the microphone, may determine a name from the sound data. Stated differently, the processor may determine that the name is part of or included in the sound data. The processor may generate a query based on the name and may send the query to a social network database. The processor may receive a response to the query from the social network database and may identify the individual based on the response.
Abstract:
Technologies are generally described for methods and systems effective to produce an evaluation image. In some examples, a processor may receive initial image data generated by light reflected from an object, that corresponds to a real object at a first instance of time. The processor may apply a first skin to modify pixels of features in the initial image data to produce intermediate data and apply a second skin to pixels of features in the intermediate data to produce augmented data. The skins may modify pixels in image data. The processor may receive evaluation image data, used to evaluate execution of the first or second skin, that corresponds to the real object at a second instance of time. The processor may apply the first skin to the evaluation image data to generate evaluation data different from the augmented data.
Abstract:
In some examples, in a supply-and-demand system, e.g., a cloud computing environment or an electrical grid, a coordinator may collect resource consumption data from one or more consuming entities. Based on the collected resource consumption data, the coordinator may be configured to predict resource consumption requirement of each consuming entity in a subsequent time period. Further, in accordance with the prediction, the coordinator may allocate the resources to the consuming entities or recycle the resources currently consumed by the consuming entities.
Abstract:
Methods, systems, caps, containers, and assemblies for a gecko-like container capping system are described. A gecko-like cap configured to cover an opening in a container may include an inner surface configured to mate with an opening surface of a container. Setae may be located on a surface of the cap and/or a surface of the container that are configured to oppose movement of the cap away from the container by creating an adhesion force between the inner surface and the opening surface. The cap may include one or more release mechanisms configured to deflect the inner surface away from the opening surface, thereby reducing the adhesion force such that the cap is removable from the container.
Abstract:
Technologies are generally described for systems, devices and methods effective to allow a network element to retrieve a control command. In some examples, a network controller device may associate an identifier with the control command. The network controller device may send the identifier and the associated control command over a first network with a first level of security to a computing device. The network controller device may send an activation signal to the network element over a second network with a second level of security different from the first level of security. The network controller device may send the identifier to the network element over the second network. The identifier may be effective to allow the network element to retrieve the control command.
Abstract:
Technologies are generally described to provide adaptable near field communication (NFC) in portable devices to enable a portable device to provide wireless power transfer (WPT) functionality and NFC functionality. According to some examples, a wireless power antenna installed on the portable device may be configured to function as a WPT antenna and as an NFC antenna. For example, the wireless power antenna may be a coil, which may be modified to adjust a quality factor (Q) by incorporation of a switchable resistor element. The modified coil may function as a wireless power receiver/transmitter with a high Q value when the resistor element is added and as an active NFC antenna with a low Q value when the resistor is not added. Additionally, the modified coil may further enable the portable device to function as a passive NFC antenna when the portable device is unpowered.
Abstract:
To automatically sort multiple contacts of a user, in some examples, a system may be configured to monitor physiological signals, which reflect the emotional responses, of the user during communications between the user and his/her contacts and, further, to classify the contacts into multiple contact groups that may be sorted by the emotional responses of the user.
Abstract:
Technology is disclosed for enabling scene-based variable compression (“the technology”). In some embodiments, the technology can receive an indication of a compression level for a first content type, wherein the compression level specifies a tolerance level for lossy compression; receive a request for content, the content having at least two portions, wherein a first portion has first content of the first content type and the second portion has second content of a second content type, a first compression method associated with the indicated compression level and a second compression method associated with a different compression level. The technology can transmit the content, wherein the first portion of the content was compressed using the first compression method and the second portion was compressed using the second compression method.
Abstract:
Technologies are generally described for generating a communication request. An example method may include retrieving an image from a memory. The method may also include sending the image to a first device operated by a first user and a second device operated by a second user. The method may also include receiving a first indication of a first selection region from the first device. The method may also include receiving a second indication of a second selection region from the second device. The method may also include analyzing the first and second selection regions. The method may also include selecting the first and second user based on the analysis. The method may also include generating the communication request to request communication between the first user and the second user. The method may also include sending the communication request to at least one of the first device or the second device.
Abstract:
Technologies are generally described herein for technologies to sense the threshold voltage for memory cells in one sensing operation. The memory cells may be storage circuits for a flash memory device, such as a multilevel flash memory device. Data may be stored and retrieved in the memory cells of the flash memory without involving the use of hardwired or predetermined thresholds. According to some configurations, the sense time distribution from a set of flash cells (e.g., one row), may be processed to decode the digital state of each memory cell. In some examples, computer-executable instructions may be used to process and decode the digital state of the memory cells.