摘要:
A novel polymeric initiator is disclosed comprising a dendritic polymer core with at least one initiating functional group as an end group. The dendritic polymeric core is preferably a hyperbranched polymer. The polymeric initiators are useful in radiation curable compositions such as varnishes, lacquers and printing inks and are especially useful in radiation curable inkjet inks.
摘要:
A large web page is analyzed and partitioned into smaller sub-pages so that a user can navigate the web page on a small form factor device. The user can browse the sub-pages to find and read information in the content of the large web page. The partitioning can be performed at a web server, an edge server, at the small form factor device, or can be distributed across one or more such devices. The analysis leverages design habits of a web page author to extract a representation structure of an authored web page. The extracted representation structure includes high level structure using several markup language tag selection rules and low level structure using visual boundary detection in which visual units of the low level structure are provided by clustering markup language tags. User viewing habits can be learned to display favorite parts of a web page.
摘要:
A content service network for providing content-oriented services over the Internet or similar networks comprises a service delivery overlay having a plurality of application servers and a content delivery network overlay having a plurality of service-enabled proxies in content delivery paths between content providers and content consumers. The service delivery overlay and the content delivery network collaborate to provide content-oriented processing, such as adaptive video delivery, content personalization, language translation, etc. The content service network accepts subscriptions from content providers and content consumer. For each subscription, service instructions including service binding data for binding the subscribed services with the subscriber's identity are generated and distributed to the service-enabled proxies. When a service-enabled proxy detects that a message passing therethrough requires a subscribed service, it retrieves service instructions for the service and renders the service either by making a remote call to an application service or by invoking a local execution module.
摘要:
Disclosed is a method for mapping pilot signals in a multiplexing mode of unicast service and Multimedia Broadcast/Multicast Service (MBMS). The method comprises the steps of: generating pilot symbols for the unicast service and the MBMS service, respectively; mapping the pilot symbols for the MBMS service to multiple transmit antennas such that, in a subframe, the pilot symbols for the MBMS service for each antenna are arranged in a same time domain and adjacent to each other, the pilot symbols for the MBMS service for the same transmit antenna are spaced from each other by a predetermined number of subcarriers in the frequency domain and by a predetermined number of OFDM symbols in the time domain, and the pilot symbols for the MBMS service for the same transmit antenna are arranged in a staggered form along the time domain, and mapping the pilot symbols for the unicast service at the same time.
摘要:
A heat pump, and in particular a heat pump for heating a hot water supply is provided with an improved defrost mode. The defrost mode is actuated to remove frost from an outdoor evaporator that may accumulate during cold weather operation. An algorithm for operation of the defrost mode is developed experimentally by seeking to maximize the heat transfer provided by the refrigerant. A heating system condition is experimentally related to the heat transfer capacity. One then maximizes the average heat transfer capacity to determine the optimum initiation point for the defrost mode. Further, protections are included into the defrost mode. When the heat pump is utilized to heat hot water, methods are provided to prevent the water that remains in the heat exchanger from becoming unduly heated. In one method, the water pump may be periodically operated to move the water. In a second method, a control ensures the discharge pressure of the refrigerant leaving the compressor is reduced, and that the water pump is not stopped until that reduced temperature falls below a predetermined maximum. The temperature reduction is achieved through a dual control loop wherein a temperature that is too high results in a new desired discharge pressure. The control achieves the new desired pressure by controlling the expansion device. In another protection feature, as a control determines that the defrost mode is nearing its end, an evaporator fan is run to remove melted water from the evaporator coils, and also to ensure the refrigerant leaving the evaporator does not reach unduly high pressure or temperatures.
摘要:
The ranking quality of a ranked list may be evaluated. In an example embodiment, a method is implemented by a system to access log data, ascertain which entries of a ranked list are skipped, and determine a ranking quality metric from the skipped entries. More specifically, log data that reflects user interactions with a ranked list having multiple entries is accessed. The user interactions include at least indications of which of the multiple entries are selected entries. It is ascertained which entries of the multiple entries of the ranked list are skipped entries based on the selected entries. The ranking quality metric for the ranked list is determined responsive to the skipped entries.
摘要:
The present invention provides a user equipment (UE), comprising: first receiving means for receiving on a first carrier information for determining a second carrier and a Multimedia Broadcast/Multicast Service (MBMS) notification; second receiving means for receiving Radio Bearer (RB) configuration information and MBMS scheduling information on the second carrier determined from the information; and control means for generating an MBMS scheduling template based on the received RB configuration information and MBMS scheduling information, wherein, the second receiving means receives MBMS data based on the MBMS scheduling template.
摘要:
The present invention relates to a method for establishing a service in a first frequency in a communication network, wherein the first frequency does not support the service or supports it in a limited way, the method comprises the following steps: determining the service to be established, re-selecting or redirecting to a second frequency that is suitable for the service, so as to carry out the service in the second frequency. The present invention also relates to user equipment and a network apparatus for establishing a service in a first frequency in a communication network, wherein the first frequency does not support the service or supports it in a limited way. According to the present invention, a non-MBMS service may be established in the MBMS dedicated frequency, so as to carry out the non-MBMS service in the normal frequency.
摘要:
The invention provides a method and device for sending MBMS traffic data based on MBMS Cell Group, the method comprises the following steps: channel coding and modulating said MBMS traffic data; determining said MBMS cell group-specific scrambling code; determining said MBMS cell-specific scrambling code; scrambling said MBMS traffic data with said MBMS cell group-specific scrambling code, and adding reference signal scrambled with said MBMS cell group-specific scrambling code and reference signal scrambled with said MBMS cell-specific scrambling code; and sending scrambled MBMS reference signal and data. With the method and the corresponding device provided by the invention, it is easy to realize RF combining or RF combining and soft combining simultaneously at UE to obtain diversity gain.
摘要:
A method and system for identifying a configuration parameter of a “sick” computer system that is at fault for causing an undesired behavior based on analysis of configuration parameters from other computer systems is provided. In one embodiment, a troubleshooting system collects “suspect” values for “suspect” configuration parameters used by a “sick” application when the undesired behavior was exhibited by the sick computer system. The troubleshooting system then compares the suspect values to sample values of the suspect configuration parameters retrieved from sample computer systems. The troubleshooting system uses that comparison to identify one or more suspect configuration parameters that are likely at fault for causing the application to exhibit the undesired behavior.