摘要:
An embedded antenna system is described for use with metallized enclosures and housings used with wireless communication devices. One or multiple radiators are coupled to a metal cover, with ground points established on the metal cover to improve radiation efficiency and control the frequency response of the antenna system. Dynamic tuning methods are described wherein detuning of the antenna system from sources such as body-loading are compensated by adjusting impedance properties of the combination of radiator and metallized cover.
摘要:
A source device obtains a data packet that includes both a destination address and a payload. The source device selects an exit point address of multiple exit point addresses corresponding to the destination address based on one or more policies. The source device encapsulates the data packet with a header that includes the selected exit point address, and the encapsulated data packet is provided to the backbone network. The encapsulated data packet is routed through the backbone network based on the exit point address, and an edge router of the backbone network identifies an interface of the edge router that corresponds to the exit point address. The header is removed from the encapsulated data packet, and the data packet is added to a buffer of the interface for routing to one or more other devices outside of the backbone network.
摘要:
A system and method for diversity implementation are provided, where diversity gains are obtained by using a hybrid of the switching technique and the combining technique in conjunction with the use of a modal antenna. The antenna system includes multiple antennas including at least one modal antenna that has multiple modes, and a processor for selecting one or more modes from the multiple modes associated with each of the at least one modal antenna, combining modes to form one or more combinations of modes, the modes in each of the one or more combinations including one of the one or more selected modes associated with each of the at least one modal antenna, and selecting one of the one or more combinations that optimizes correlation and/or a quality metric for diversity.
摘要:
A system is disclosed for optimizing product merchandising area allocation. One example includes receiving inputs defining financial metrics for product categories. A linear regression model forecasts responses of the financial metrics for the product categories to endogenous variables, which include sales per merchandising area per product category per store and total sales volume per store. Each of the product categories includes a user option to select constraints for either a minimum and maximum of an area in which the product category is displayed, or a minimum and maximum change from a current area in which the product category is displayed. The system generates a merchandising plan that optimizes for the combined total of the financial metrics of the product categories in accordance with the linear regression model, including changes in merchandising area for each of a plurality of the product categories, within the selected constraints.
摘要:
A server device is configured to receive a request to identify a manner in which changed code propagates within an application; generate a group of blocks that correspond to code associated with a parent function corresponding to the application and which includes the changed code; perform an intra-procedural analysis on the group of blocks to identify a block that is affected by the changed code included within an epicenter block; perform an inter-procedural analysis on functions associated with the block, where, when performing the inter-procedural analysis, the server device is to generate another group of blocks associated with the functions, and identify another block that is affected by the changed code included within the epicenter block; and present, for display, information associated with the block or the other block that enables the application to be tested based on the block or the other block.
摘要:
A human-readable list of patch differences ranked by weight helps vulnerability analysts allocate their time. From binary code, identified source functions and recognized sink functions are used when assigning relative weights to changes caused by a patch. Source functions are identified using an export table, import table, and remote procedure call interface. Sink functions are recognized using blacklisted functions, patch-targeted functions, memory functions, string functions, and functions called with mismatched parameters. A change prioritizer assigns weights based on an architectural graph and a set of prioritization rules that specify what kind of change is made by a patch, and what kind of function is changed. Weight assignments may be additive. Rules may assign certain kinds of change a higher priority for subsequent scrutiny by an analyst.
摘要:
The present disclosure is directed to a highly dilutable chemical mechanical polishing concentrate comprising an abrasive, an acid, a stabilizer, and water with a point-of-use pH ranging from 2.2-3.5 for planarizing current and next generation semiconductor integrated circuit FEOL/BEOL substrates.
摘要:
A protocol for secure peer-to-peer communications is established based on existing cryptographic techniques and encryption algorithms. The peers (120, 130, 140) and a central security agent (110) undergo mutual authentication. A newly generated nonce is used for authentication, and a random session key is used for a session. The security agent (110) generates unique session keys for communication between peers (120, 130, 140). The security agent (110) removes the burden of mutual authentication between requested peer (130, 140) and the requesting peer (120), as the security agent (110) independently authenticates the requesting peer (120) and the requested peer (130, 140). The requested peer (130, 140) and the requesting peer (120) are sent a session key by the security agent (110).
摘要:
A network processor and a deterministic method are described herein that can prevent a dataplane malfunction within a packet processing pipeline by delaying a configuration manager from being able to immediately re-use entries which have been freed-up/deleted from shared memory.
摘要:
A protocol for secure peer-to-peer communications is established based on existing cryptographic techniques and encryption algorithms. The peers (120, 130, 140) and a central security agent (110) undergo mutual authentication. A newly generated nonce is used for authentication, and a random session key is used for a session. The security agent (110) generates unique session keys for communication between peers (120, 130, 140). The security agent (110) removes the burden of mutual authentication between requested peer (130, 140) and the requesting peer (120), as the security agent (110) independently authenticates the requesting peer (120) and the requested peer (130, 140). The requested peer (130, 140) and the requesting peer (120) are sent a session key by the security agent (110).