Abstract:
Methods, computing devices, and machine readable storage media for generating a fingerprint of a music sample. The music sample may be filtered into a plurality of frequency bands. Onsets in each of the frequency bands may be independently detected. Inter-onset intervals between pairs of onsets within the same frequency band may be determined. At least one code associated with each onset may be generated, each code comprising a frequency band identifier identifying a frequency band in which the associated onset occurred and one or more inter-onset intervals. Each code may be associated with a timestamp indicating when the associated onset occurred within the music sample. All generated codes and the associated timestamps may be combined to form the fingerprint.
Abstract:
A method for fingerprinting an unknown music sample is disclosed. A plurality of known tracks may be segmented into reference samples. A reference fingerprint including a plurality of codes may be generated for each reference sample. An inverted index including, for each possible code value, a list of reference samples having reference fingerprints that contain the respective code value may be generated. An unknown fingerprint including a plurality of codes may be generated from the unknown music sample. A code match histogram may list candidate reference samples and associated scores, each score indicating a number of codes from the unknown fingerprint that match codes in the reference fingerprint. Time difference histograms may be generated for two or more reference samples having the highest scores. A determination may be made whether or not a single reference sample matches the unknown music sample based on a comparison of the time difference histograms.
Abstract:
The present application relates to an insect resistant transgenic cotton plant, In particular, it relates to a specific event, designated COT102. The application also relates to polytucleotides which are characteristic of the COT102 event, plants comprising said polynucleotides, and methods of detecting the COT102 event. The COT 102 event exhibits a novel genotype comprising two expression cassettes. The first cassette comprises a suitable promoter for expression in plants operably linked to a gene that encodes a VIP3A insecticidal toxin, useful in controlling a vide spectrum of lepidopteran insect pests, and a suitable polyadenylation signal. The second cassette comprises a gene which, when expressed, can be used as a selectable marker.
Abstract:
The present application relates an insect resistant transgenic cotton plant. In particular, it relates to a specific event, designated COT102. The application also relates to polynucleotides which are characteristic of the COT102 event, plants comprising said polynucleotides, and methods of detecting the COT102 event. The COT102 event exhibits a novel genotype comprising two expression cassettes. The first cassette comprises a suitable promoter for expression in plants operably linked to a gene that encodes a VIP3A insecticidal toxin, useful in controlling a wide spectrum of lepidopteran insect pests, and a suitable polyadenylation signal. The second cassette comprises a gene which, when expressed, can be used as a selectable marker.
Abstract:
A method of controlling a wireless docking station, which has one or more peripheral devices connected thereto, which are controllable from a mobile device when the mobile device is docked with the wireless docking station. The method involves receiving (S41) a sensing signal indicating that a user is proximate the peripheral device(s) and detecting (S42) that a mobile device is within a predetermined range of the wireless docking station. An identification of the mobile device is determined and the user is requested (S43) to confirm that the user wants to dock the mobile device having the identification with the wireless docking station. When a confirmation signal (S44) is received, an authentication of the mobile device having the identification is permitted to be performed whereby the mobile device having the identification is docked (S47) with the wireless docking station if the authentication is successful.
Abstract:
A method of controlling a wireless docking station, which has one or more peripheral devices connected thereto, which are controllable from a mobile device when the mobile device is docked with the wireless docking station. The method involves receiving (S41) a sensing signal indicating that a user is proximate the peripheral device(s) and detecting (S42) that a mobile device is within a predetermined range of the wireless docking station. An identification of the mobile device is determined and the user is requested (S43) to confirm that the user wants to dock the mobile device having the identification with the wireless docking station. When a confirmation signal (S44) is received, an authentication of the mobile device having the identification is permitted to be performed whereby the mobile device having the identification is docked (S47) with the wireless docking station if the authentication is successful.
Abstract:
A method of configuring a Universal Serial Bus (USB) connection between a first and second devices, the USB connection comprising a plurality of data channels, each having a pair of signal links, each signal link including a port at either end of the connection, and a signal wire formed of one or more physical wires extending between corresponding ports. Each of the signal links are configured with a first direction for transmission of data. The first direction is determined based on an initial required data transmission capacity in each direction between the first and second devices. Thereafter, depending on required capacity in the different directions, a selection is made which of the signal links should change their direction of transmission from the first direction to a second direction and a redirection signal is sent to each of the selected signal links to cause the change in direction of transmission.
Abstract:
Abstract of the DisclosureA system includes hosts that may be infected with mobile logic. One type of mobile logic is a worm, which can be a process that is capable of causing a (possibly evolved) copy of itself to execute on one or more hosts of the system. An infected host of the system can infect other hosts based on criteria, such as targeting, visibility, vulnerability, or infectability of the other hosts. A worm can be represented as a Turing Machine whose state can be determined using computational methods. A worm can be emulated in the system to determine worm detection capabilities of the system. Emulating the worm can allow the system to be tested with less negative impact than using the actual worm.