摘要:
The present invention is a multi-layer computer architecture which separately extracts ALC business and logical functions and data. The architecture creates a Java object model or other target language object model which allows comparison of ALC data with target language data to verify logical processes. These object models can be directly traced back to the legacy ALC. The data model is automatically generated from a scan of the ALC and leverages generic patterns which can be reused to generate Java representations of other legacy code bases.
摘要:
The method for translation of assembler computer language to validated object-oriented programming language converts Assembler Language Code (ALC) logical processes to equivalent object-oriented processes. The method uses various iteratively updated rules sets and graphical analysis tools to automate the translation process. The method further uses a Technical Rule Language (TRL) as an intermediate scripting language to map ALC sequential instruction sets to simplified Java constructs, which are verified and then translated to Java executable code.
摘要:
A strap band including a flexible wire bus having electrodes and wires coupled with the electrodes is described. The wire bus may be include in a strap band formed by molding an inner strap, mounting the wire bus in the inner strap, and injection molding an outer strap over the inner strap and wire bus to form a strap band. The electrodes may be positioned on the inner strap to accommodate a target range of a body portion the strap band may be worn on. A material of the strap band and a material the wire bus may be selected to allow a low coefficient of friction between the wire bus and strap band so that loads applied to the strap band may not be coupled with the wire bus or cause damage to wires due to pull and/or torsional load forces applied to the strap band.
摘要:
A method for reporting and obtaining channel state information, an eNodeB, and a user equipment are disclosed. The method for reporting channel state information includes: determining a reported content in channel state information (CSI) of downlink component carriers according to priorities of contents-in-CSI, where the CSI of the downlink component carriers includes the reported content and a content that is not to be reported; and reporting the reported content to an eNodeB on a physical uplink control channel (PUCCH). By determining a reported content in CSI according to a priority, the shortage of a CSI reporting resource may be relieved.
摘要:
Embodiments relate generally to electrical/electronic hardware, computer software, wired and wireless network communications, portable, wearable, and stationary media devices. RF transceivers and/or audio system in each media device may be used to wirelessly communicate between media devices and allow configuration and other data to be wirelessly transmitted from one media device to another media device. The proximity detection system may be configured to detect a presence of a user or multiple users and upon detecting presence, access content on a user device, and record the content while also playing back the content on the media device. One or more user devices in proximity of the media device post detection may wirelessly communicate with the media device and the media device may orchestrate handling of content from those devices or from a wirelessly accessible location such as the Cloud or Internet.
摘要:
A method, an apparatus, and a system for transmitting information bits, where the method for transmitting information bits includes: dividing the information bits to be transmitted into at least two groups; encoding the information bits to be transmitted in each group; modulating the coded bits obtained by the encoding to obtain modulation symbols, in which each modulation symbol is obtained by using the modulation of the coded bits in the same group; and mapping and transmitting the modulation symbols. In this way, the receiving end easily reduces the algorithm complexity, thereby ensuring the performance of the receiving end.
摘要:
A method for transmitting and receiving Uplink Control Information (UCI), a terminal, and a base station are provided. The transmitting method includes: calculating the number (Q′) of modulation symbols occupied by the UCI to be transmitted; dividing the information bit sequence of the UCI to be transmitted into two parts; using Reed Muller (RM) (32, 0) codes to encode each part of information bit sequence of the UCI to be transmitted to obtain a 32-bit coded bit sequence respectively, and performing rate matching so that the rate of the first 32-bit coded bit sequence is ┌Q′/2┐×Qm bits and that the rate of the second 32-bit coded bit sequence is (Q′−┌Q′/2┐)×Qm bits; and mapping the two parts of coded bit sequences that have undergone rate matching onto a Public Uplink Shared Channel (PUSCH), and transmitting the coded bit sequences to a base station.
摘要:
An item of clothing (10) for daily pharmacological treatment of a fungal infection, comprising: a textile material (20) to manage moisture when the item of clothing (10) is worn; microcapsules (30) grafted on the textile material (20); and antifungal agents encapsulated within the microcapsules (30) to pharmacologically treat the fungal infection when released from the microcapsules (30).
摘要:
A mobile communication system, a mobile communication device, and a method for incoming-call filtering are provided. The mobile communication device includes a wide area communication module and a local area communication module that are selectively enabled. A server includes a plurality of data groups and at least one response function. As the server receives an incoming call through a wide area communication network asking for communication with the communication device, the server compares a data of the incoming call with the plurality of data groups and then performs one response function based on the result of comparison.
摘要:
Techniques are provided for improving security in a single-sign-on context by providing, to a user's client system, two linked authentication credentials in separate logical communication sessions and requiring that both credentials be presented to a host system. Only after presentation of both credentials is the user authenticated and permitted to access applications on the host system.