Abstract:
A method for supplying power to detected devices coupled to a conductive backplane includes: supplying a plurality of sensing signals at a plurality of transmit impedance values to the conductive backplane; analyzing a plurality of return signals received from the conductive backplane, the return signals corresponding to the sensing signals; detecting the presence of a sink device coupled to the conductive backplane based on the analyzed return signals; and supplying power from a power supply to the sink device via the conductive backplane after detecting the presence of the sink device.
Abstract:
Methods of processing seismic data using a single triaxial geophone. In certain examples, such a method includes calibrating the single triaxial geophone sensor to determine a position and an orientation relative to a surrounding environment, configuring the single triaxial geophone sensor to receive seismic data from the surrounding environment along three orthogonal axes, measuring, with the single triaxial geophone sensor, a plurality of time series of seismic data from the surrounding environment for the three orthogonal axes, storing, with a computer system coupled to the single triaxial geophone sensor, the time series of seismic data from the surrounding environment for the three orthogonal axes, and processing, with the computer system, the time series of seismic data to identify a plurality of seismic waves of different polarizations.
Abstract:
Embodiments of a system and method for generating a shaped cyclic time-domain waveform are generally described herein. In some embodiments, a first transform may be performed on an input symbol vector to generate a transformed input vector in a transform domain. The transformed input symbol vector may be expanded to generate an expanded symbol vector. At least some elements of the expanded symbol vector may be weighted with a weighting vector selected for pulse shaping to generate a weighted symbol vector. A second transform may be performed on the weighted symbol vector to generate an output symbol vector for subsequent processing and transmission. The second transform may be an inverse of the first transform and may comprise a greater number of points than the first transform.
Abstract:
A system and method for secure substring search, using fully homomorphic encryption, or somewhat homomorphic encryption. In one embodiment, a first string is homomorphically compared to trial substrings of a second string, each comparison producing a ciphertext containing an encrypted indication of whether the first string matches the trial substrings. These ciphertexts are then combined in a homomorphic logical OR operation to produce a ciphertext which contains an encrypted indication of whether the first string matches any of the trial substrings, i.e., whether the first string is contained in the second string.
Abstract:
A system and method for secure substring search, using fully homomorphic encryption, or somewhat homomorphic encryption. In one embodiment, a first string is homomorphically compared to trial substrings of a second string, each comparison producing a ciphertext containing an encrypted indication of whether the first string matches the trial substrings. These ciphertexts are then combined in a homomorphic logical OR operation to produce a ciphertext which contains an encrypted indication of whether the first string matches any of the trial substrings, i.e., whether the first string is contained in the second string.
Abstract:
An approach to computation of kernel descriptors is accelerated using precomputed tables. In one aspect, a fast algorithm for kernel descriptor computation that takes O (1) operations per pixel in each patch, based on pre-computed kernel values. This speeds up the kernel descriptor features under consideration, to levels that are comparable with D-SIFT and color SIFT, and two orders of magnitude faster than STIP and HoG3D. In some examples, kernel descriptors are applied to extract gradient, flow and texture based features for video analysis. In tests of the approach on a large database of internet videos used in the TRECVID MED 2011 evaluations, the flow based kernel descriptors are up to two orders of magnitude faster than STIP and HoG3D, and also produce significant performance improvements. Further, using features from multiple color planes produces small but consistent gains.
Abstract translation:使用预先计算的表加速了内核描述符的计算方法。 在一个方面,一种用于内核描述符计算的快速算法,其基于预先计算的内核值在每个补丁中每像素执行O(1)个操作。 这将加速考虑的内核描述符功能,达到与D-SIFT和颜色SIFT相当的水平,比STIP和HoG3D快两个数量级。 在一些示例中,内核描述符被应用于提取用于视频分析的梯度,流和纹理的特征。 在对TRECVID MED 2011评估中使用的大量互联网视频数据库的方法进行测试时,基于流的内核描述符比STIP和HoG3D快两个数量级,并且还可以显着提高性能。 此外,使用来自多个颜色平面的特征产生小但恒定的增益。
Abstract:
A system for managing encryption keys within a domain includes: a client computer (200) coupled to a cloud key management server (100) over a network (110), the client computer being configured to supply a request for an encryption key, the request including an object identifier of the object (402) associated with the encryption key; and a cloud key management service comprising the cloud key management server, the cloud key management service being configured to: store a plurality of encryption keys in association with a plurality of object identifiers; receive the request from the client computer; identify an encryption key of the stored encryption keys associated with the object identifier of the request; and send the identified encryption key to the client computer in response to the request.
Abstract:
A method for encrypting and storing data on a removable medium includes: obtaining a medium key uniquely associated with the removable medium; encrypting the data using the medium key to generate encrypted data; and writing the encrypted data onto the removable medium.
Abstract:
Embodiments of a near-field communication (NFC) system and method for private near-field communication are generally described herein. In some embodiments, a resonance-coupled channel is masked with a random channel-masking signal. The channel-masking signal may be scaled based on near-field channel conditions. Signals received through the channel may be unmasked with the scaled channel-masking signal to determine data that may have been conveyed by an NFC transmitting device by affecting the impedance of the resonance-coupled channel. In some embodiments, a reference signal may be scrambled with a mask to generate the channel-masking signal. The mask may include at least one of a random symbol mask, an amplitude mask and a phase mask. For additional privacy, the mask may include a random symbol mask and at least one of an amplitude mask and a phase mask.
Abstract:
A magnetic memory system includes a superconductor circuit and one or more magnetic memory elements to store data. To write data, a driver circuit in the superconductor circuit generates a magnetic signal for transmission over a superconductor link extending between the superconductor circuit and the magnetic memory element. To read data, a sensing circuit in the superconductor circuit monitors a superconductor link extending from sensing circuit to the magnetic memory element. The magnetic memory element can be a spin-transfer type magnetic memory element.