Abstract:
A conical mount is used to mount a novelty item such as a pennant, figurine, or advertising shape secure on a post such as an automobile antenna. The conical mount secures the item rigidly to the antenna at any selected location by cooperating with a corresponding conical aperture on the mounted item to provide a fitted attachment between the novelty item and the conical mount. The two halves of the conical mount have mating tabs and slots that provide for a compressive interlock about the varying diameters of an antenna.
Abstract:
A pennant holder for attaching a pennant to a small pole, comprising: a pole holder made out of a plastic material in the shape of a cylinder having a closed end, the closed end being slit to form flaps that permit the pole to pass through the closed end of the cylinder while displacing the flaps and causing the flaps to grasp and hold the pole, the pole holder having an integral receiving U-shaped clip; and a pennant attachment having two mating halves that grasp the attachment end of the pennant and hold it along the length of the attached end, the pennant attachment adapted to fit into the receiving clip in the pole holder.
Abstract:
Systems and methods are provided for malware scanning and detection. In one exemplary embodiment, the method includes a hub computing device that receives, from a controller computing device, a scan request, and identifies spoke computing devices for performing the scan request. The method performed by the hub computing device also includes sending to the identified spoke computing devices, the scan request, receiving, from the spoke computing devices, results associated with the scan request, and sending, to the controller computing device, the results associated with the scan request.
Abstract:
A portable shelter kit is usable for erecting a temporary or long term structural shelter. The portable shelter kit includes a two-part shipping container which comes apart into pieces which are usable as component parts of the shelter. A method of using the kit to construct a portable shelter is also described.
Abstract:
A computing device runs multiple activities concurrently and provides at least two modes for interacting with the activities. The user may toggle between the modes as desired. In a full-screen mode, one activity occupies substantially an entire display screen. In a windowed mode, the activity is visible within a window, and a portion of at least one other window is also visible. In the windowed mode, the user can cause windows to move, thereby changing focus from one activity to another. For example, the window having focus can be moved off the screen, to be replaced by a new window that is then given focus. The windows are ordered in a sequence and move in concert with one another; pushing one window off one edge of the screen causes a new window to appear at the opposite edge. A persistent positional relationship can be established among windows.
Abstract:
A method of detecting malicious software (malware) includes receiving a file and storing a memory baseline for a system. The method also includes copying the file to the system, executing the file on the system, terminating operation of the system, and storing a post-execution memory map. The method further includes analyzing the memory baseline and the post-execution memory map and determining that the file includes malware.
Abstract:
Systems and methods are presented for increasing the frame rate of real-time 3D ultrasound imaging. In one embodiment, the frame rate for generating a pseudo-shaded 2D projection image may be increased by controlling the image reconstruction process. Rather than beamforming, scan converting, and interpolating a 3D voxelized data set of an entire scanned volume, only samples required for generating the 2D projection image may be reconstructed. The element data measured from each transducer array element may be combined to directly reconstruct those 3D image samples required by the volume rendering algorithm to generate the 2D projection image.
Abstract:
Techniques for differentially enhancing selected areas within a digital image are disclosed. In certain embodiments, one or more attributes of a selected pixel or a group of pixels is determined. Examples of such attributes include color properties, grayscale properties, and/or multi-pixel properties, such as texture. In certain embodiments, the attribute may be used in conjunction with the properties of a modification tool, such as a brush, to selectively modify pixels having the attribute value or a similar attribute value.
Abstract:
A dynamic web installer, in which a user selects components via an external input selector (e.g. a web page) and, based on those selections, generates a custom installer to include only the components requested by the user. The user can then retrieve this installer and perform the installation.
Abstract:
Embodiments presented herein describe a method, a system and a computer program product for ultrasound imaging. The method in one example includes receiving a plurality of ultrasound echo signals from a plurality of transducer elements in response to ultrasound transmit beams. The method computes beam sums of ultrasound echo signals originating from a point to be imaged, for the corresponding ultrasound transmit beams. The method generates a time record comprising a plurality of beam sums, wherein the time record includes beam sums corresponding to multiple instants of time in a time window. The method filters the time record based, at least in part, on a predetermined response function. Finally, the method reconstructs the point to be imaged based on one or more of the filtered time records corresponding to one or more of the plurality of ultrasound transmit beams. The method repeats this process for each point to be imaged.