摘要:
A method and storage device for assessing execution of trim commands are provided. In one embodiment, a trace of trim and write commands sent to a storage device are obtained. For each trim command in the trace, a subsequent write command to a same logical block address (LBA) as the trim command is identified, and an elapsed time between the trim and write commands is calculated. This information can be used to display a histogram and/or to optimize when the storage device executes trim commands and/or when the host device issues trim commands.
摘要:
A method and host device for assessing execution of trim commands are provided. In one embodiment, a trace of trim and write commands sent to a storage device are obtained. For each trim command in the trace, a subsequent write command to a same logical block address (LBA) as the trim command is identified, and an elapsed time between the trim and write commands is calculated. This information can be used to display a histogram and/or to optimize when the storage device executes trim commands and/or when the host device issues trim commands.
摘要:
A method and storage device for assessing execution of trim commands are provided. In one embodiment, a trace of trim and write commands sent to a storage device are obtained. For each trim command in the trace, a subsequent write command to a same logical block address (LBA) as the trim command is identified, and an elapsed time between the trim and write commands is calculated. This information can be used to display a histogram and/or to optimize when the storage device executes trim commands and/or when the host device issues trim commands.
摘要:
A method and storage device for detection of streaming data based on logged read/write transactions are provided. In one embodiment, a storage device classifies data as belonging to one of at least three classes based on a set of characteristics and then applies operational parameters to the data depending on the class of the data. Other embodiments are possible, and each of the embodiments can be used alone or together in combination.
摘要:
Inspection of objects such as semiconductor wafers may proceed on a cell-to-cell or die-to-die basis. An image of a wafer may be obtained and the cells or dies shown therein can be inspected using any combination of appropriate die-to-die or cell-to-cell inspection methods. For example, one or more areas may be designated for cell-to-cell inspection. For each cell type, a reference image can be generated by obtaining an image of the area and displacing the image by an amount equal to the repetition vector for that cell type in opposite directions. The displaced images and the original image can be combined into a single reference image. The original image can then be compared to the reference image. In some embodiments, the displaced images are also compared to the reference image to statistically determine the presence or absence of defects.
摘要:
All-optical quasi-phase matching (QPM) uses a train of counterpropagating pulses to enhance high-order harmonic generation (HHG) in a hollow waveguide. A pump pulse enters one end of the waveguide, and causes HHG in the waveguide. The counterpropagation pulses enter the other end of the waveguide and interact with the pump pulses to cause QPM within the waveguide, enhancing the HHG.
摘要:
Inspection of objects such as semiconductor wafers can include comparisons of shapes between inspection and reference images. As part of the inspection process, relative values may be assigned to pixels within each image based on comparison of such pixels to neighboring pixels. For instance, the pixels may be ranked by relative brightness in each image. Alternatively, directional vectors may be defined based on slopes between pixels and their neighbors. Various comparison metrics may be utilized to determine the degree of correlation between the relative values for pixels in the inspection image and corresponding pixels in the reference image. Relative values may be combined with conventional techniques as part of an inspection process. The inspection may be performed using an optical inspection tool that uses conventional techniques to identify defect candidates, with relative value analysis performed on areas containing defect candidates to confirm or deny the existence of a defect.
摘要:
Methods, apparatus, systems and software for distributed microservices communication for real-time multi-view computer vision streaming applications. In one aspect, a method for producing immersive sports video content is provided. A plurality of video feeds from a plurality of physical cameras (PCams) installed in a stadium or venue are received at a data center, where the PCams have respective viewpoints directed toward at least one of a field or court in the stadium or venue and one or more players participating in a sport being played in the stadium or venue. The plurality of video feeds are processed in parallel at the data center using a plurality of distributed stateful and stateless processing services to generate a three-dimensional point cloud comprising a volumetric model including a plurality of voxels and process the plurality of voxels from each of a plurality of viewpoints associated with respective virtual cameras (VCams) to output video streams in real-time.
摘要:
A technological platform in which “clips” or short segments of play from a game may be automatically extracted and optionally analyzed, for example to support later searching of such clips for a clip having one or more features of interest.
摘要:
This computer software program provides way for people from all over the world of all ages and sex, to participate in a matchmaking experience over the internet in real time. This application includes a graphical user interface which displays a table containing say, ten people (5 pairs per session). It is based on what is known as “blind dating” that takes place in physical locations around the world and is incorporated into the World Wide Web. However, in this program the participants will only see the person they are chatting with, while the other participants remain anonymous until the completion of the first round comprising of an initial chat. The program will use a dating website profile database accordingly to the users who play the game.