摘要:
A monitoring device which enables a user to address a failure before said failure occurs, a radio communication system, a failure prediction method and a non-temporary computer-readable medium in which a program is stored are provided. This monitoring device is provided with an acquisition unit and a prediction unit. The acquisition unit acquires history data which is generated in one or more radio communication devices and which indicates at least the time at which a received signal level falls below a preset threshold level in each preset time period. The prediction unit predicts, based on the history data, the possibility of a failure occurring in the radio communication device.
摘要:
The present invention relates to a gel electrolyte comprising a cyclic sulfonic acid ester represented by formula (1). According to the present invention, it is possible to provide a gel electrolyte capable of suppressing the self-discharge of a polymer secondary battery, and a polymer secondary battery using the gel electrolyte. wherein R1 and R2 are each independently a hydrogen atom, an alkyl group having 1 to 5 carbon atoms, a halogen group or an amino group with the proviso that R1 and R2 are not hydrogen atoms at the same time; R3 represents a linkage group selected from the group consisting of an alkylene group having 1 to 5 carbon atoms, a carbonyl group, a sulfonyl group, a fluoroalkylene group having 1 to 6 carbon atoms, and a divalent group having 2 to 6 carbon atoms in which alkylene units or fluoroalkylene units are bonded through an ether group.
摘要:
A system is proposed to provide handover in a mobile telecommunications environment, particularly applicable to 3GPP networks, which does not increase signalling overhead but minimizes user data loss during handover. In the modified system, PDCP SDUs with Sequence numbers are buffered and retransmitted as necessary. At the time of handover, SDUs not received by the user device are forwarded to the target base station for forward transmission to the UE. The handover procedure is designed to minimize packet loss while keeping to a minimum the duplication of packet transmission over the air interface.
摘要:
A radio terminal (3) can perform carrier aggregation using a first cell (10) of a first radio station (1) and a second cell (20) of a second radio station (2). The first radio station (1) performs, with the radio terminal (3), radio resource control for the first cell (10) and the second cell (20) in order to perform the carrier aggregation. Further, the first radio station (1) transmits, to the second radio station (2), update information regarding an update to a configuration related to the radio resource control for the second cell (20). It is thus, for example, possible to prevent or reduce data transmission/reception failures which would otherwise occur while a configuration of radio parameters or the like is being changed by a radio terminal in carrier aggregation of a plurality of cells served by different radio stations.
摘要:
A communication apparatus comprises: a plurality of storage units adapted to store a process corresponding to a packet; a first unit that refers to at least one of the plurality of storage units and searches for a process corresponding to an incoming packet; and a second unit that queries, from among a plurality of control apparatuses, a control apparatus associated with a storage unit, in which the first unit has detected a predetermined condition, for a process corresponding to the incoming packet.
摘要:
Computerized methods and systems for automating a process of creating and mounting live copies of data to applications in accordance with workflows that specify procedures for creating and mounting the live copies of data to the applications. The methods and systems comprise executing at least one workflow associated with a data object based on a triggering event, and executing a set of configurable work actions associated with the at least one workflow; creating a snapshot of data volumes associated with the data object; creating liveclone volumes based on the snapshot of the data volumes, and mounting and dismounting the liveclone volumes to and from at least one application.
摘要:
A method and apparatus for detecting malicious software activity, using at least one processor, based on an Internet resource information database in memory is described. In one embodiment, a method for detecting malicious software activity, using at least one processor, based on an Internet resource information database in memory includes processing Internet activity to determine source and time information associated with at least one application download, comparing the Internet resource information database with the source and time information associated with the at least one application download to identify at least one suspicious application, and monitoring execution of the at least one suspicious application.
摘要:
Methods and systems for incrementally selecting and providing relevant search engines in response to a user query. A method of incrementally selecting and providing relevant search engines is based in part on identifying a set of search engines associated with corresponding metadata, receiving a partial search query entered by the user of a device, inferring after each user keypress a set of potential full queries intended by the user, using the potential full queries and the search engine metadata to identify a set of relevant search engines, and for each of these search engines, providing a direct link to launch a relevant query in the search engine. The user input may be either ambiguous, or erroneous, and may be entered using an input-constrained device.
摘要:
Methods and systems for text disambiguation and context designation in incremental search are provided. A method for selecting items in response to ambiguous keystrokes entered by a user and unambiguous metadata associated with a previously selected search result includes receiving ambiguous keystrokes, selecting and presenting a first subset of items and metadata associated with the items presented based on the ambiguous keystrokes. The method also includes receiving a selection of one of the items from the user, and, in response to a locking operation received from the user, locking in fixed relation at least one of the ambiguous keystrokes to at least one metadata term associated with the selected item. The method further includes, subsequent to receiving the locking operation, selecting and presenting a second subset of items based at least in part on the locked metadata term, and presenting the second subset of items.
摘要:
A method for file lock recovery in a distributed computer system. The method includes executing a distributed computer system having a plurality of nodes comprising a cluster, and initiating a network file system server fail over from one node of the cluster to an adoptive node of the cluster. File lock services are then stopped at the adoptive node. File lock services are subsequently restarted at the adoptive node, wherein the restart causes the adoptive node to commence a grace period for other network file system clients to connect to the adoptive node and reclaim file locks. After restarting file lock services, a cluster file system is updated on the adoptive node with process identifiers, and file lock services are resumed at the adoptive node. The cluster file system can be simultaneously exposing the file lock services to other clients as well, like CIFS, etc.