Abstract:
Methods, apparatuses, and systems for in-or near-memory processing are described. Strings of bits (e.g., vectors) may be fetched and processed in logic of a memory device without involving a separate processing unit. Operations (e.g., arithmetic operations) may be performed on numbers stored in a bit-serial way during a single sequence of clock cycles. Arithmetic may thus be performed in a single pass as numbers are bits of two or more strings of bits are fetched and without intermediate storage of the numbers. Vectors may be fetched (e.g., identified, transmitted, received) from one or more bit lines. Registers of the memory array may be used to write (e.g., store or temporarily store) results or ancillary bits (e.g., carry bits or carry flags) that facilitate arithmetic operations. Circuitry near, adjacent, or under the memory array may employ XOR or AND (or other) logic to fetch, organize, or operate on the data.
Abstract:
Various embodiments relate to multi-modulus frequency dividers, devices including the same, and associated methods of operation. A method of operating a multi-modulus divider (MMD) may include determining a common state for the MMD, wherein the MMD is configured to enter the common state regardless of a divisor value applied to the MMD. The method may further include receiving an integer value at the MMD. Further, the method may include setting the divisor value equal to the integer value. The method may also include receiving an input signal at a first frequency and generating an output signal at a second, lower frequency based on the divisor value. The method may also include receiving a second integer value at the MMD. The method may further include setting the divisor value equal to the second integer value in response to a detected current state of the MMD matching the common state for the MMD.
Abstract:
Configurable ovoid units, earth-boring tools including configurable ovoid units, and related methods are disclosed. An earth-boring tool may include a body including at least one blade. The earth-boring tool may further include a cutting element secured to the at least one blade and including at least one sensor configured to sense at least one condition of the cutting element. Moreover, the earth-boring tool may include at least one configurable ovoid unit disposed at least partially within the at least one blade and comprising an adjustable ovoid head. Additionally, the earth-boring tool may include a control module disposed within the earth-boring drilling tool. The control module may be configured to receive sensor data from the at least one sensor, and to convey at least one signal to the at least one ovoid unit for configuring the at least one ovoid unit in response to the sensor data.
Abstract:
Automatic card shufflers may include a card input mechanism for inputting cards into the card shuffler, a card storage device for receiving cards from the card input mechanism and temporarily storing cards within the card shuffler, and a card output mechanism for outputting cards from the card shuffler. The automatic card shufflers may randomly select an internal compartment to be an overflow compartment for inserting cards when a failure of insertion of a card to a selected primary card position occurs.
Abstract:
Methods of authenticating a file are disclosed. A method may include selecting, via an identifier, a subset of data segments of a file. The method may also include executing, via a microcontroller, a cryptographic function on only the subset of data segments of the file to generate a digest. Further, the method may include generating, via the microcontroller, an authenticator based on the digest and a private key. The method may also include conveying the file, the identifier, and the authenticator to a cryptography element. In addition, the method may include executing, via the cryptography element, the cryptographic function on the subset of data segments of the file to generate a second digest. Furthermore, the method may include authenticating, via the cryptography element, the file via verification of the authenticator based on the second digest and a public key of the microcontroller.
Abstract:
Various embodiments relate to delta-sigma loop filters with input feedforward. A delta-sigma loop filter may include a first integrator and a quantizer having an input coupled to an output of the first integrator. The delta-sigma loop filter may further include a first summing node having an output coupled to an input of the first integrator. Further, the delta-sigma loop filter may include a feedforward path from an input of the delta-sigma loop filter to a first input of the first summing node. The delta-sigma loop filter may also include a first feedback path from an output of the quantizer to a second input of the first summing node.
Abstract:
Exemplary embodiments are directed to systems and methods for tracking data during operation of a power transfer device. A system may include an electrical relay and a switch. The switch may be coupled to each of the electrical relay and a power transfer device and may be configured to couple the electrical relay to a reference voltage upon engagement of the power transfer device. The system may further include a processing unit configured to receive a signal from the electrical relay while the power transfer device is engaged.
Abstract:
The disclosure extends to moisture resistant energy storage devices, such as rechargeable batteries, and associated methods of forming the same. An energy storage device, such as a rechargeable battery, may comprise a cell including at least one electrical terminal and a circuit board electrically coupled to the at least one electrical terminal. The rechargeable battery may also include a moisture resistant coating on at least a portion of at least one of a surface of the cell and a surface of the circuit board. A moisture resistant coating may reside between the circuit board and the cell.
Abstract:
Methods and systems for a computer network security system are disclosed A computer security system includes at least one computer configured to be operably coupled to a remote network and having an application program comprising a login scripts database and a variable database The security system further includes a client device configured to be operably coupled to the computer to allow for the use of the application program The application program dynamically generates a password upon attempting to access a remote network Furthermore, the application program may update passwords within a user's login scripts database Additionally, a remote network may support the security system and may include at least one computer system having an administrator application program installed thereon and configured to receive a network device and an administrator device A network administrator may use the network and administrator device to monitor and modify contents of the security system