Abstract:
A method and a signal processing unit are proposed, for converting an asynchronous discrete-time signal to a synchronous discrete-time signal by performing sector-based timing recovery. The timing recovery includes aligning an initial portion of the asynchronous discrete-time signal to a first portion of a predetermined signal, and a later portion of the asynchronous discrete-time signal to a second portion of a predetermined signal. Optionally, the method and signal processing unit further perform sector based gain control, and sector-based removal of any dc component.
Abstract:
An elastic sleeve method and apparatus for use with a bar of soap to limit the surface area of the soap that is exposed, and reduce the rate of shrinkage of the bar of soap. The sleeve comprises a container of elastic material having a top, bottom, and an elastic opening for insertion of a soap cake. The elastic material has form-fitting dimensions adaptable to the shape of an underlying soap cake. The elastic material also has a plurality of apertures to provide atmospheric communication through the elastic sleeve to an inserted soap cake's surface and a plurality of bristles on the bottom to enhance suds and exfoliation.
Abstract:
A method and system for mobile information security protection may include extracting, by a first processor, identification information corresponding to a plurality of applications installed on a mobile device, sending the extracted identification information to a server, matching, by a second processor, the identification information to information stored in a database storage, receiving matched information from the database storage as a result of matching the identification information, sending the matched information to the mobile device, and presenting the matched information to a user of the mobile device.
Abstract:
The present disclosure provides a method and system for monitoring an application. The method comprises creating a simulated system service; establishing a connection with a function in a device driver that manages an Input/Output (I/O) channel of the device; intercepting data transmitted from the application to the function in the device driver that manages the I/O channel of the device; replacing, based on the intercepted data, a system service requested by the application with a corresponding simulated system service; and recording a request received by the simulated system service and forwarding the request to an analysis module for analysis. The present disclosure is advantageous in that the system request is intercepted during the Binder communication process of the system and the simulated system layer service is used for analyzing the behavior features of the application in the Android operating system. In contrast to other application blocking techniques, the method and system according to the present disclosure do not disturb the normal operation of the application.
Abstract:
A method and system for quickly retrieving the information service on a mobile terminal, adopt the structure of client/server. The method comprises: the user is directly interactive with a server and retrieves the information service via the client module bound at the terminal; the user directly enters a keyword on the desktop of the terminal; the client module queries the client database, server-side database and server-side searching device respectively, based on the present service mode and the information entered by the user, obtains the corresponding network service and content resource, and selects the relevant network as the service carrier based on the service mode, directs the user to enter these network resources to obtain the information service directly.
Abstract:
The invention provides a method for preventing a mobile communication device from leaking secret and a system thereof. In the method, by adopting a mobile communication device side and PC side structure, a controlling module installation package is transferred from a PC side to the mobile communication device; a controlling module runs automatically and obtains root privilege of the operating system of the mobile communication device; the controlling module forbids functions of silently dialing, silently answering, photo taking, video recording, voice recording, Bluetooth and infrared connection. The advantages of the present invention are that the present invention is suitable for on-site operation and possibility of leaking secret by any mobile communication device is eliminated by a PC terminal.
Abstract:
A method for context-based multi-dimensional searching of contacts in a phone address book is disclosed, the method comprises, inputting the searching field, determining if the searching field matches a certain city name, searching the full visiting card information in the address book, and sorting coordinators in the address book based on the multiple dimensions.
Abstract:
A buffer management method based on a bitmap table includes: dividing the bitmap table into a plurality of areas each containing at least one bit; determining and recording an idleness status of each of the areas in accordance with an unoccupied status of the bit in the area; and performing a management on a buffer address pointer in accordance with the recorded idleness status of each of the areas. The entire inventive procedure of allocating a buffer address pointer is fixed and easily controllable, and the RAM consumed for management on each buffer element including at least a 1-bit buffer space is approximately 1 bit, with a relatively fewer resources being consumed. The invention can enable that it takes two clock cycles on average to complete one procedure of allocating a buffer address pointer, and thus the efficiency in allocating and reclaiming a buffer address pointer is high, and the controllability during buffer management is improved. In the case that as a few as possible resources are consumed, the capability in buffer management is improved to a maximal extent, and hence the inventive can satisfy the demand of a large bandwidth for a large buffer.
Abstract:
An apparatus is made from the material that can conduct the ultra-sonic wave. The ultra-sonic wave can oscillate the large water molecule into smaller ones or smash them. Make the apparatus as the comb teeth and integrate it with the traditional hair dryer to help to dry the wet hair in a very short time, 3˜5 minutes.
Abstract:
A recycling facility includes a receptacle for receiving the ammunition to be cleaned, a gas tank for receiving a pressurized gas and coupled to the receptacle, for supplying the pressurized gas to the receptacle, and a heater coupled between the gas tank and the receptacle, for preheating the pressurized gas before the pressurized gas flowing into the receptacle, and for melting and removing the TNT material from the ammunition. The receptacle includes a control valve coupled between the heater and the receptacle, and a control valve coupled between the heater and the gas tank. A collecting casing may be coupled to the receptacle, and coupled to the gas tank via a filter.