Abstract:
A method for repairing a component is provided. The method comprises: tracing an electrode across a defect/damage on the component at a preselected distance from the component; feeding a first metal powder and a second metal powder into a discharging gap between the electrode and the component; controlling feed rates of the first and second metal powders separately; and electro-spark depositing the first and second metal powders to the component to form a hybrid metal coating. The first metal powder comprises a first metal or alloy with a Vickers hardness rating of about 70-200% of the Vickers hardness rating of the component. The second metal powder comprises a second metal or alloy having lubricating/anti-corrosion properties.
Abstract:
According to an exemplary embodiment of the present invention, a method to configure a network of classifiers includes configuring a plurality of classifiers in a network of classifiers, such that the configuring associates a plurality of operating points with each output branch, associating a different quality profile with each output point for each output branch in the plurality of classifiers, and storing the configured network of classifiers and quality profile associations in the computer system to be used for classifying future input data according to the network configuration and quality profile association. Each classifier comprises executable code that classifies the data. Each of said classifiers has a plurality of the output branches that each output the data to another classifier. Each operating point comprises a probability of determining that a data item input to the classifier has a particular characteristic and a probability that said determination falsely detected the characteristic.
Abstract:
A program interface which provides access from a business management application to an accounting application to share account information. As described in illustrative embodiments, the system includes an interface module to instantiate and invoke an interface from the business management application to generate an accounting record from an opportunity or prospect record in the business management application. Thus, the accounting record is generated through the interface from the business management application to eliminate the need for duplicate data entry in the accounting application.
Abstract:
The present invention describes a method and system for optimizing a test flow within each ATE (Automated Test Equipment) station. The test flow includes a plurality of test blocks. A test block includes a plurality of individual tests. A computing system schedule the test flow based one or more of: a test failure model, test block duration and a yield model. The failure model determines an order or sequence of the test blocks. There are at least two failure models: independent failure model and dependant failure model. The yield model describes whether a semiconductor chip is defective or not. Upon completing the scheduling, the ATE station conducts tests according to the scheduled test flow. The present invention can also be applied to software testing.
Abstract:
An edge-covering based greedy method for shared filter ordering includes receiving a plurality of queries, wherein each query is a conjunction of filters, and each filter is shared across multiple queries of the plurality of queries, evaluating a unit price of each filter, evaluating, sequentially, each filter in order of a lowest to a highest unit price, to determine a value for each filter, and changing an ordering of the filters according to the values. An edge-covering based harmonic method for shared filter ordering includes receiving a plurality of queries, wherein each query is a conjunction of filters, and each filter is shared across multiple queries of the plurality of queries, evaluating a weight of each filter, evaluating, randomly, each filter having a probability inversely proportionally to its weight, to determine a value, and changing an ordering of the filters according to the values.
Abstract:
An edge-covering based greedy method for shared filter ordering includes receiving a plurality of queries, wherein each query is a conjunction of filters, and each filter is shared across multiple queries of the plurality of queries, evaluating a unit price of each filter, evaluating, sequentially, each filter in order of a lowest to a highest unit price, to determine a value for each filter, and changing an ordering of the filters according to the values.An edge-covering based harmonic method for shared filter ordering includes receiving a plurality of queries, wherein each query is a conjunction of filters, and each filter is shared across multiple queries of the plurality of queries, evaluating a weight of each filter, evaluating, randomly, each filter having a probability inversely proportionally to its weight, to determine a value, and changing an ordering of the filters according to the values.
Abstract:
A package substrate includes die solder pads and pin solder fillets. The pin solder fillets might comprise between approximately 90 wt % to approximately 99 wt % tin and approximately 10 wt % to 1 wt % antimony. The die solder pads might comprise between approximately 4 wt % to approximately 8 wt % bismuth, approximately 2 wt % to approximately 4 wt % silver, approximately 0 wt % to approximately 0.7 wt % copper, and approximately 87 wt % to approximately 92 wt % tin. The die solder pads might comprise between approximately 7 wt % to approximately 20 wt % indium, between approximately 2 wt % to approximately 4.5 wt % silver, between approximately 0 wt % to approximately 0.7 wt % copper, between approximately 0 wt % to approximately 0.5 wt % antimony, and between approximately 74.3 wt % to approximately 90 wt % tin.
Abstract:
Performing adaptive cyber-security analytics including a computer implemented method that includes receiving a report on a network activity. A score responsive to the network activity and to a scoring model is computed at a computer. The score indicates a likelihood of a security violation. The score is validated and the scoring model is automatically updated responsive to results of the validating. The network activity is reported as suspicious in response to the score being within a threshold of a security violation value.
Abstract:
A method for repairing a component is provided. The method comprises: tracing an electrode across a defect/damage on the component at a preselected distance from the component; feeding a first metal powder and a second metal powder into a discharging gap between the electrode and the component; controlling feed rates of the first and second metal powders separately; and electro-spark depositing the first and second metal powders to the component to form a hybrid metal coating. The first metal powder comprises a first metal or alloy with a Vickers hardness rating of about 70-200% of the Vickers hardness rating of the component. The second metal powder comprises a second metal or alloy having lubricating/anti-corrosion properties.
Abstract:
A system for supporting version management is provided. The system includes a first application having a plurality of versions. Each of the plurality of versions is associated with a separate a version-specific assembly. A loader is configured to load one of the version-specific assemblies, the assembly then being utilized as a basis for deriving an object from a database associated with the first application. The object is provided to a second application, typically in response to a corresponding request.