Abstract:
In order to compensate for rate mismatches between near end (receiving) and far end (transmitting) devices, intelligent jitter buffer management is implemented by apparatus comprising: a data interface for receiving frames from a data network; a jitter buffer for temporarily storing said frames; a detector for detecting frames which satisfy a criteria; and a buffer manager for controlling the frames stored in said jitter buffer based on the condition of said buffer and on frames which satisfy said criteria. The criteria can include silence frames or frames received with errors. The condition can include a high water mark (high threshold), and a low water mark (low threshold). If the far end transmitter transmits at a faster rate than the near end receiver, the jitter buffer will eventually become full beyond the high water mark, in which case frame(s) which satisfy the criteria will be deleted. If the far end transmitter transmits at a slower rate than the near end receiver, the jitter buffer will eventually become depleted below the low water mark, in which case silence frame(s) will be inserted after received silence frames.
Abstract:
Novel synergistic insecticidal compositions comprising as the active ingredient an insecticidally effective amount of a synergistic mixture of 90 to 60% by weight of (S) 1-oxo-2-allyl-3-methyl-cyclopent-2-en-4-yl d trans chrysanthemate and 10 to 40% by weight of (R) 1-oxo-2-allyl-3-methyl-cyclopent-2-en-4-yl d trans chrysanthemate and to a novel method of combatting arthropodes.
Abstract:
A packetised data network includes IP telephones (ITs) and a network intelligence (NI). All of the keys of each IT are “soft” keys (i.e., they have no fixed function). The NI associates a configuration data structure with the IT which correlates the keys with functions, and, based on this, may control the display of the IT to indicate the current function of certain of the soft keys. Some of the functions are requests for data services at the telephone (e.g., video or programmed audio over the Internet). When a user requests such a service with a key press, the NI sets up the service between the data source and the telephone. This may require associating a new configuration data structure with the keys of the IT. The IT user may activate multiple data services through the NI.
Abstract:
A packetised data network includes IP telephones (ITs) and a network intelligence (NI). All of the keys of each IT are “soft” keys (i.e., they have no fixed function). The NI associates a configuration data structure with the IT which correlates the keys with functions, and, based on this, may control the display of the IT to indicate the current function of certain of the soft keys. Some of the functions are requests for data services at the telephone (e.g., video or programmed audio over the internet). When a user requests such a service with a key press, the NI sets up the service between the data source and the telephone. This may require associating a new configuration data structure with the keys of the IT. The IT user may activate multiple data services through the NI.
Abstract:
A bias network for providing the ECL reference voltages V.sub.REF1 and V.sub.REF2. Bipolar npn transistors are arranged to receive the collector terminal potentials of the emitter-coupled pair of the bias network. The npn transistors form the input devices of a differential amplifier that includes a pair of FETs arranged as a current mirror. One of each of such FETs is in series with each of the input transistors. The differential amplifier regulates the potential at an internal node of the bias network to thereby maintain the operating point of the network so that the potentials of the collector terminals are equal. As a result the bias network is rendered substantially insensitive to both temperature and supply voltage variations.
Abstract:
A packetised data network includes IP telephones (ITs) and a network intelligence (NI). All of the keys of each IT are “soft” keys (i.e., they have no fixed function). The NI associates a configuration data structure with the IT which correlates the keys with functions, and, based on this, may control the display of the IT to indicate the current function of certain of the soft keys. Some of the functions are requests for data services at the telephone (e.g., video or programmed audio over the internet). When a user requests such a service with a key press, the NI sets up the service between the data source and the telephone. This may require associating a new configuration data structure with the keys of the IT. The IT user may activate multiple data services through the NI.
Abstract:
An improved tri-state output buffer of the type that includes an output stage comprising a pair of bipolar transistors in a totem-pole configuration. A CMOS predriver arrangement includes a circuit configuration for selectively adjusting the resistance between the base and the emitter of the source-follower output transistor. The predriver protects the source-follower from harmful bias effects by selectively adjusting the resistance in the emitter-to-base path of the source-follower.
Abstract:
A broad-band cavity-tuned transistor oscillator includes a field effect device having capacitive feedback from source to drain and having a gate capacitively coupled to a cavity for producing an output signal that is frequency selectable according to cavity resonance, which resonance is determined by translation position of a mechanical tuning plunger coupled to the cavity and the degree of capacitive feedback.
Abstract:
A process for the production of a .DELTA..sup.4 -gonenic steroid having the formula ##SPC1##Wherein R represents a member selected from the group consisting of hydrogen and the acyl of an organic carboxylic acid having from 1 to 18 carbon atoms, R' represents an alkyl having from 1 to 4 carbon atoms, R.sup.iv represents a member selected from the group consisting of lower alkyl, lower alkenyl or lower alkynyl, and B represents a member selected from the group consisting of two hydrogens in the 9.alpha. and 10.beta. position and a double bond which comprises the steps of reacting a 3-ketal-4,5-seco-gonane-5-one with a ketalizing agent, oxidizing the resultant 3,5-diketal-4,5-seco-gonane-17.beta.-ol, reacting the resultant 3,5-diketal-4,5-seco-gonane-17-one with an organometallic compound, hydrolyzing the resultant 3,5-diketal-17.alpha.-R.sup.iv -4,5-seco-gonane-17.beta.-ol, cyclizing the resultant 17.alpha.-R.sup.iv -4,5-seco-gonane-17.beta.-ol-3,5-dione and recovering said .DELTA..sup.4 -gonenic steroid. The novel intermediates are also part of the invention. The .DELTA..sup.4 -gonenic steroids are known compounds having steroidal properties.
Abstract:
A packetised data network includes IP telephones (ITs) and a network intelligence (NI). All of the keys of each IT are “soft” keys (i.e., they have no fixed function). The NI associates a configuration data structure with the IT which correlates the keys with functions, and, based on this, may control the display of the IT to indicate the current function of certain of the soft keys. Some of the functions are requests for data services at the telephone (e.g., video or programmed audio over the internet). When a user requests such a service with a key press, the NI sets up the service between the data source and the telephone. This may require associating a new configuration data structure with the keys of the IT. The IT user may activate multiple data services through the NI.