Abstract:
A process of treating a silicon substrate surface for optimizing sunlight capture in the fabrication of solar cells is disclosed. Each of the two sides of the silicon substrate is textured with a laser source to roughen its surface by fabricating nanoscale structures thereon. Surface texturing may be conducted on both sides of a crystalline silicon wafer by flipping over to repeat our process on the other side such that sunhght reflectivity is minimized and photon trapping is maximized. The process may be conducted in room temperature and vacuum in a dry-etch processing environment. The substrate may undergo translation in the X- Y axes for control of the substrate's movement to achieve the requisite texturing by the laser beam of a pulse laser of Nd-YAG source in 533 nm and 1024 nm wavelengths at > 75 joules/pulse with translation speed of
Abstract:
The present invention relates to a system (100, 200) and method (300) for protection of user authentication against at least single instance of capture-and-replay attacks, by means of input and processing of user credentials on a client-side user interface (Ul), and subsequent transmission to a server undertaking credential authentication. The system (100, 200) and method (300) of the present invention utilizes credentials which are context dependent as inputs into ZK integration function which is additionally applicable as an interaction in two actions: firstly between user and trusted platform, and secondly between trusted platform and client terminal, as similarly protective of user authentication against capture-and-replay- attacks. The user submits credentials as an act of authentication based on context of interest (310) as deemed correct by user. Optional verification of the submitted context-dependent credential (320) on the client terminal or trusted platform follows. The method (300) involves ZK integration of the context-dependent credential (330) followed by verification of the authenticator (340), such that unauthorised interception of credentials as submitted does not necessarily result in capability of intercepting party to undertake fraudulent authentication. Verification of user-to-server authentication interaction as being correct is additionally dependent on independent determination by server of context of interest, which might include specification and stratification of time and/or location of the authentication interaction.
Abstract:
The method comprises forming a trench structure (100), forming a gate electrode inside the trench through gate oxidation (200); forming a polysilicon gate (300); forming a pre-metal dielectric layer (400); forming a polysilicon recess (1000) in the polysilicon gate; depositing a transitional metal layer (450); forming metal silicide layer (500) through rapid thermal annealing; conducting chemical cleaning to remove unreacted metallic layer on the gate oxide (2000) and conducting second thermal rapid annealing (3000).
Abstract:
The present invention relates to a system (100) and method for reducing handover latency in a wireless network. The system (100) comprises of at least one mobile node (200); at least one access point (AP) (300); at least one access controller (AC) (400) connected to the AP (300); at least one other neighbour AC (500); and at least one other neighbour AP (600). The system (100) is further characterised in that at least one Received Signal Strength (RSS) Checker module (10), at least one Moving Weight Discovery (MWD) module (20), at least one Client Movement Prediction (CMP) module (30) and at least one Access Controller Context Manager (ACCM) module (40).
Abstract:
The present invention provides system and method which provides for a version of a deployed package to be determined and verified against release packages stored in a versioning repository. The system (100) of the present invention to determine version of deployed package comprising at least one release package (102) for locating and extracting deposited package; at least one versioning repository (104) for pairing and committing signature with package; at least one signature generator (106) for generating signature; at least one traversor (108a) for traversing down repository tree from said versioning repository; and at least one comparor (108b) for comparing stored signature with signature generated from deployed system. The present invention combines the features of existing and proven versioning repositories with a signature generator to uniquely identify the release system packages. These signatures are stored in the same tag within the repository and these signatures can be compared against the signature generated from the deployed system using an integrated tool. The distinctiveness of the present invention lies in the creation of a single unique signature for the single release package based on a pre-determined list of non-changeable files.
Abstract:
The present invention relates to a system and method for extracting objects from interlaced images, wherein the system and method generates a path topology map and computes a calibrated event profile module to identify similar objects moving sequentially in the same direction along the same path and similar objects moving sequentially in different directions along the same path in interlaced images. Most illustrative drawing: Figure
Abstract:
A voice controlled system (10) and method for performing navigation and data entry in form based applications comprises of a user interface module (11) to access the user interface components, a voice recognition module (13) to receive voice data input by the user from an input device, and a navigation and data entry module (12) is operable to identify the user interface components on which task to be performed based on the grammar of the voice data input to perform command instructions, performing data entering (49) if said recognized content of the voice input data does not match (43) the type of command of said grammar file, by finding component in a UI registry unit (18) to be focused (44) and validating the voice data input that applies a set of rules defined by the components to perform conversions of data.
Abstract:
The present invention relates to a method for estimating a possible route of an incomplete tag access information. The method comprises the steps of receiving all tag access information including tag identification numbers, connected region identification and need tag values; creating a region ontology for each tag access information received; setting the row and column of the region ontology according to the connected region identification; filling up the region ontology with tag identification numbers and need tag values; generating intensity profile data based on historical data; searching for probable route based on the region ontology; estimating the best route based on the probable route found and intensity profile data; and displaying the best route.
Abstract:
The present invention relates to a system (100) and method for screen capturing for real-time transmission. In particular, the present invention relates to a system (100) and method for capturing desktop screen adaptively based on current desktop application or content, local computing resource and local communication resource. The system (100) comprises of a Graphical User Interface (GUI) (10), a Session Module (20), a Security Module (30), a Connection Module (40) and a Screen Analysis Module (50).
Abstract:
Disclosed herein is a method for booting an embedded device (100) by using an external USB device (200) without the need to know the IP address, service set identifier (SSID), username, password, or a combination thereof of the embedded device (100). In general, the method works by detecting the presence of the external USB device (200) (701). Once detected, a verification process is performed to confirm the authenticity of the external USB device (200) (702) before the embedded device (100) is booted via the external USB device (200). Subsequently, the external USB device (200) sets the IP address, SSID, username, password, or a combination thereof of the embedded device (100) to default (704), and then proceeds to scan the hardware of the embedded device (705) (100) in order to determine the relevant new firmware (300), new configuration file (400), or a combination thereof. A user will then be able to view the existing configuration of the embedded device (100) (707), and choose to update the existing firmware (708), the existing first configuration file (104) (709), or both by using the determined new firmware (300) and determined new configuration file (400).