摘要:
An optical control device having at least two optical fibers arranged extremely adjacent to each other over a certain distance so that the optical fibers are optically coupled to each other. Among optical waves propagating in one of the optical fibers, a particular optical wave which is selected by the propagation constants of the two optical fibers and the propagation constant of an ultrasonic applied to the one optical fiber is transmitted to the other optical fiber.
摘要:
Multiple similarities between phoneme feature data extracted from a word input signal and reference pattern data read out from a reference pattern memory are calculated by a similarity calculation section. The multiple similarities are converted by a conversion filter into posterior probabilities using parameter sets which are read out from a filter parameter bank in accordance with the obtained multiple similarities. The posterior probabilities are subjected to matching with data stored in word dictionary by a word matching section, thus discriminating the input word.
摘要:
A memory management and protection system for realizing a high speed execution and a proper and flexible memory access control for multiple programs sharing an identical logical address space. In the system, the memory access is permitted according to a segment identifier identifying a segment in the logical address space, and a memory protection information for a region in each segment including a target right permission to indicate assigned rights to make a memory access from the region to each of the segments, and an execution permission to indicate a type of the memory access permitted by the right permission. Alternatively, a memory access can be permitted by using an access control list to be attached to each address table entry, which stores a plurality of program numbers identifying programs which are permitted to make accesses to the logical address stored in each address table entry, among which one that matches with the current program number is to be searched. Also, it is preferable to allocate a plurality of programs within a limit of available memory protection capacity to an identical logical address space, without any overlap between adjacently allocated address regions.
摘要:
A method for managing virtual address space in which programs designed for smaller virtual address spaces in the multiple virtual memory scheme can be collectively allocated to a single enlarged virtual address space in the single virtual memory scheme efficiently, without requiring any change in the programs themselves, such that the entire virtual address space becomes available in the compatible mode. In the method, the effective addresses to be used during an execution of a program designed for a smaller address space are calculated by combining an appropriate address base for this program specifying upper bits of the effective address and lower bits of the virtual addresses for a region of the enlarged address space to which this program is allocated. The address base may be replaced by the upper bits of the starting address of the program in the enlarged address space which are retained throughout the effective address calculation. The method may use a compatible mode address region to be used in executing a program designed for a smaller address space which has virtual addresses identical to those to which this program is designed to be allocated in the smaller address space.
摘要:
Infrared rays radiated from a moving object is converged into a plurality of infrared ray detectors by optical system. Detecting area is instituted by the optical system so as to put the infrared rays into a plurality of the infrared ray detectors with time difference therebetween. Signal processing unit produces a detecting signal when there is a predetermined time difference between signals produced by a plurality of the infrared ray detectors. It is possible to avoid wrong operation which is caused by popcorn noise and a differential noise having a bit of time difference caused by temperature gradient in space. Forming a curved imaginary boundary line, a plurality of detecting zones are disposed at out side and inside of the curved imaginary boundary line to detect the object invading from any direction.
摘要:
The present invention provides a manufacturing method for an oxide-dispersed alloy in which dispersed particles consisting of oxides of one or two or more kinds of additive metals are dispersed in a matrix metal, comprising the steps of (a) manufacturing alloy powder or an alloy wire rod consisting of the matrix metal and the additive metal; (b) oxidizing the additive metal in the alloy powder by water to form dispersed particles by introducing the alloy powder or alloy wire rod into a high-energy ball mill with water and by making agitation; and (c) moldedin solidifying the alloy powder or alloy wire rod after oxidation. The present invention is especially useful in manufacturing an oxide-dispersed alloy in which the free energy of oxide formation of the matrix metal is higher than water standard free energy of formation, and the free energy of oxide formation of the additive metal is lower than water standard free energy of formation.
摘要:
A memory management and protection system for realizing a high speed execution and a proper and flexible memory access control for multiple programs sharing an identical logical address space. In the system, the memory access is permitted according to a segment identifier identifying a segment in the logical address space, and a memory protection information for a region in each segment including a target right permission to indicate assigned rights to make a memory access from the region to each of the segments, and an execution permission to indicate a type of the memory access permitted by the right permission. Alternatively, a memory access can be permitted by using an access control list to be attached to each address table entry, which stores a plurality of program numbers identifying programs which are permitted to make accesses to the logical address stored in each address table entry, among which one that matches with the current program number is to be searched. Also, it is preferable to allocate a plurality of programs within a limit of available memory protection capacity to an identical logical address space, without any overlap between adjacently allocated address regions.
摘要:
A thin-film device having the structure of a bipolar transistor is provided. The device has three thin-films formed one on another to form emitter, base and collector regions, thereby providing a NPN or PNP structure depending on the impurities contained in these thin-films. The present bipolar thin-film device is particularly useful as a phototransistor, though use is not limited only for this. A non-transparent, insulating layer having an opening may be provided to limit the passage of light and to improve the transistor characteristics.
摘要:
A dot array fluorescent tube for an optical printer writes optical information on a photoconductive element by converting an information signal representative of a desired image to optical information. A grid electrode disposed in a vacuum space defined in a housing has a slot-like opening in a portion thereof which faces an array of fluorescent elements which are formed on anodes, which are also arranged in an array in the lengthwise direction of the housing. The grid electrode is formed as a metal film on the housing through an insulating layer. A conductive light intercepting film is deposited on the housing except for a limited portion which faces the fluorescent element array, thereby regulating the direction of light which is transmitted through the housing. The fluorescent elements in the array provide a plurality of dot arrays which are controlled independently of each other. Lead terminals are connected with the anodes and led out to the outside of the housing to be connected to external drive devices by an anisotropic conductive rubber connector. The lead terminals are divided into groups each made up of a predetermined number.
摘要:
A decryption key management scheme for a software distribution system utilizing the decryption key, which can enable the re-install of the software that was decrypted once by a proper procedure, without requiring a re-acquisition of the decryption key from the software vender, so that a user can freely delete and re-install the software that was properly obtained once. The decryption key is searched in a memory device of a user's computer, or acquired from a distribution source of the encrypted software when the decryption key is not found in the memory means. Then, the encrypted software is decrypted by using the obtained decryption key, and a decrypted software content is installed into the memory device, while the decryption key acquired from the distribution source is stored into the memory device, such that the decryption key stored in the memory device is utilizable in decrypting the encrypted software at a time of re-installing the encrypted software.