Abstract:
In a fully homomorphic encryption scheme, a method is provided for performing a homomorphic operation on a data set by applying an encrypted operand supplied as a ciphertext. A data set containing ‘i’ library vectors, each with ‘j’ coefficients is subjected to a pivot operation such that each set of common ‘j’ coefficients is stored in respective library ciphertexts. A query ciphertext containing a query vector is then subjected to a homomorphic pivot operation to separate out its ‘j’ coefficients into respective pivoted query ciphertexts. A more efficient homomorphic computation can then be carried out between the ciphertexts of the pivoted forms of the query and library vectors so as to compute an encrypted set of vector differences between the query vector and each of the library vectors.
Abstract:
A method for viewing a plurality of encrypted code displayed within an integrated development environment with a pair of augmented reality (AR) glasses. A plurality of user login credentials submitted by a user utilizing the pair of AR glasses to access a plurality of encrypted code. The method may determine the user is authorized to access a portion of the plurality of encrypted code based on the received plurality of user login credentials. The method may further decrypt the portion based on determining the user is authorized to access the portion. The method may further include displaying the decrypted portion on a lens within the pair of AR glasses.
Abstract:
A method for viewing a plurality of encrypted code displayed within an integrated development environment with a pair of augmented reality (AR) glasses. A plurality of user login credentials submitted by a user utilizing the pair of AR glasses to access a plurality of encrypted code. The method may determine the user is authorized to access a portion of the plurality of encrypted code based on the received plurality of user login credentials. The method may further decrypt the portion based on determining the user is authorized to access the portion. The method may further include displaying the decrypted portion on a lens within the pair of AR glasses.
Abstract:
A window has a pane of transparent material. A first set of microfluidic channels pass through a first area of the pane, and a second set of microfluidic channels pass through a second area of the pane. Microfluidic planes are in fluid communication with the first and second sets of microfluidic channels. A first pump is in fluid communication with the first set of microfluidic channels, and selectively moves a first fluid having a first level of opacity through the microfluidic planes via the first set of microfluidic channels. A second pump is in fluid communication with the second set of microfluidic channels, and selectively moves a second fluid having a second level of opacity through the microfluidic planes via the second set of microfluidic channels. Moving the second fluid into the microfluidic planes pushes the first fluid out of the microfluidic planes, thereby adjusting an opacity of the window.
Abstract:
A headphone apparatus with selectable sound admission is described including an earphone apparatus. The earphone apparatus includes a housing being shaped to substantially cover an ear of a wearer when the headphone apparatus is worn, a sound emitting component within the housing, a baffle member formed of a flexible, sound-insulating material in the form of an open-ended tube having an outer open end and an inner open end with a central axis through the tube, the baffle member has an open arrangement with the tube providing an open channel and a closed arrangement in which the baffle member is twisted about the central axis to form a closed neck in the baffle member thereby preventing sound from transmission through the tube, and an operating mechanism for operating switching of the baffle member between the open and closed arrangements.
Abstract:
A headphone apparatus with selectable sound admission is described including an earphone apparatus. The earphone apparatus includes a housing being shaped to substantially cover an ear of a wearer when the headphone apparatus is worn, a sound emitting component within the housing, a baffle member formed of a flexible, sound-insulating material in the form of an open-ended tube having an outer open end and an inner open end with a central axis through the tube, the baffle member has an open arrangement with the tube providing an open channel and a closed arrangement in which the baffle member is twisted about the central axis to form a closed neck in the baffle member thereby preventing sound from transmission through the tube, and an operating mechanism for operating switching of the baffle member between the open and closed arrangements.
Abstract:
A method and/or computer program product assists in locating objects using a local physical device and one or more remote physical devices having image capture capability. A local physical device captures one or more reference images of an object, and shares identification metrics associated with one or more reference images of the object with one or more of the remote physical devices. One or more remote physical devices captures one or more images of an area in which the object may be located, and determines, using the identification metrics, whether any of the images captured includes the object. In response to a determination that any of the images captured includes the object, those images are stored and associated with the object. In response to the object being lost by a user, the local physical device reviews the stored images to determine a location of the lost object.
Abstract:
Software that uses machine logic to identify expert(s) for functional components of source code, determining a confidence value for each functional component based on the availability of its respective expert(s), by performing the following steps: (i) receiving a first functional component of a set of source code; (ii) receiving a set of knowledgeable person(s) information including identifying information for at least one person and respectively associated availability information for each identified person, where each person identified in the set of knowledgeable person(s) information has knowledge of the first functional component; and (iii) calculating, based, at least in part, on the identified person(s) and their respectively associated availability information, a confidence value for the first functional component relating to the availability of person(s) with knowledge of the first functional component.
Abstract:
Version history tracking of functional components is provided. Whether a source of a functional component is known to a version history tracker is determined. If the source of the functional component is determined to be not known to the version history tracker, an automated analysis of content of the functional component is performed. If the source of the functional component is determined to be known to the version history tracker, a bifurcated version history hierarchy of the functional component is created using at least partial data transfer between at least two functional components irrespective of any metadata associated with either of the at least two functional components. A branched network of the version history for the functional component is produced. The branched network of the version history is based on at least one of the automated analysis and the bifurcated version history hierarchy.
Abstract:
According to one embodiment, a method for lossy data compression is provided. The method may also include determining a length and a plurality of bounding characters associated with each data item within the data message. The method may further include encoding each data item within the data message by replacing each data item with the determined length and the determined plurality of bounding characters. The method may also include transmitting the data message to a recipient.