This page is updated frequently with new Exponent-related patent applications.
|Communication apparatus and communication inverse discrete-fourier-transforming a frequency domain signal into a time domain symbol sequence|
A communication apparatus includes a receiver, a combiner, and a transformer. The receiver receives signals mapped on plural frequency bands.
Sun Patent Trust
|Arrangement and measuring temperature|
An arrangement for measuring temperature comprises a temperature sensor (11) including a main section (12) and separated electrical terminals (13, 14), wherein the main section (12) has an accentuated temperature dependent electrical resistivity and the electrical terminals are electrically connected to the main section (12); and an arrangement (15) for measuring an electrical resistance configured to measure the electrical resistance over the electrical terminals (13, 14), wherein the measured electrical resistance is indicative of the temperature of an object in thermal contact with the main section. The main section (12) may have an electrical resistivity as a function of temperature within a specified temperature interval, such as e.g.
|Successive approximation method with a nonlinear characteristic|
A circuit comprises a successive approximation analog-to-digital converter that comprises a feedback path and is operated for example in accordance with the successive approximation method. The feedback path is configured to translate a digital signal in accordance with a prescribed function and to furthermore convert the translated digital signal into an analog feedback signal.
Lantiq Beteiligungs-gmbh & Co. Kg
|Apparatus and methods using drillability exponents|
Various embodiments include apparatus and methods to generate and use drillability exponents. Data acquired from downhole sensors can be used to determine drillability exponents.
Halliburton Energy Serices, Inc.
|Weighted multi-band cross color channel predictor|
A sequence of visual dynamic range (vdr) images is encoded using a standard dynamic range (sdr) base layer and one or more enhancement layers. A predicted vdr image is generated from an sdr input by using a weighted, multi-band, cross-color channel prediction model.
Dolby Laboratories Licensing Corporation
|Optical touch screen with a lossy dispersive ftir layer|
A touch sensitive screen arrangement includes an optically dispersive base plate and structures for transmitting light onto the base plate in response to an external body touching the screen at a touch point such that the location of incident light on the surface of the base plate is representative of the relative position of the touch point on the screen. The base plate captures and disperses light that is incident on it.
|Decomposition of decimal floating point data|
A decimal floating point finite number in a decimal floating point format is composed from the number in a different format. A decimal floating point format includes fields to hold information relating to the sign, exponent and significand of the decimal floating point finite number.
International Business Machines Corporation
|Estimation of lesion size|
A method, consisting of ablating tissue for a time period, measuring a contact force applied during the time period, and measuring a power used during the time period. The method further includes ceasing ablating the tissue when a desired size of a lesion produced in the tissue, as estimated using an integral over the time period of a product of the contact force raised to a first non-unity exponent and the power raised to a second non-unity exponent, is reached..
University Of Oklahoma Health Sciences Center
A distance estimate between two nodes may be determined from a path loss exponent and a direct path energy estimate. The direct path energy estimate may be determined from channel state information of a packet received from one of the nodes.
Hewlett Packard Emterprise Development Lp
|Dynamic identity verification and authentication continuous, dynamic one-time-pad/one-time passwords and dynamic distributed key infrastructure for secure communications with a single key for any key-based network security controls|
A method of using a single, one-time pre-distributed and pre-authenticated symmetric whitenoise key structure or other exponential key or deterministic random number generator to establish secure key-based communications between a first source computer and a second destination computer (endpoint, sensor or smart component) to provide continuous, dynamic, one-time-pad authentication throughout a session (not just at sign-in or login). By polling ahead in an exponential key stream with specific indexes, pointers or dynamic offsets the method creates an infinite number of identifiable one-time-pad tokens that have never been created or used before and deterministic, random key streams of functionally limitless length that will easily outlive the life of the person or device deploying it.
Rsa decryption using multiplicative secret sharing
An embodiment features an rsa process in which the private key is separated into shares. Decryption (and authentication and other rsa objectives) may be accomplished by successive modular exponentiation of, for example, a ciphertext or a signature..
Determining location of a user device
Method(s) and system(s) for determining location of a user device within a premise are described. The method includes identifying multiple zones with physical boundaries within the premise based on parameters associated with geometry of the premise.
Tata Consultancy Services Limited
Correction of diffraction effects in an ultrasonic sensor
Embodiments of correcting diffraction effects in an ultrasonic sensor are disclosed. In one embodiment, an ultrasonic sensor may include an ultrasonic transmitter configured to transmit an ultrasonic wave, a piezoelectric receiver layer configured to receive a reflected wave of the ultrasonic wave, where the reflected wave comprises a plurality of images of a fingerprint having a plurality of phases in a time sequence, and a platen layer configured to protect the ultrasonic transmitter and the piezoelectric receiver layer.
Re-encryption key generator, re-encryption apparatus, encryption apparatus, decryption apparatus, and storage medium
According to one embodiment, a re-encryption key generator which generates the re-encryption key based on the first private key, the second re-encryption key generation key, and a plurality of random numbers. The second re-encryption key generation key comprises a plurality of system-specific values and the second private key.
Toshiba Solutions Corporation
Method of processing signals, data processing system, and transceiver device
A data processing system may include a transmit circuit configured to transmit a first signal sequence comprising one or more signals, a receive circuit configured to transmit a second signal sequence comprising one or more additional signals, wherein one or more signals of the second signal sequence comprise an interference component related to the first signal sequence, and a processing circuit. The processing circuit may be configured to generate a kernel set comprising one or more kernels based on the first signal sequence, wherein a first kernel of the kernel set comprises: a first complex exponential component of the first kernel based on the phase of a first signal of the first signal sequence, and a second complex exponential component of the first kernel based on the amplitude of the first signal of the first signal sequence, and apply the kernel set to generate a solution to a linear system, wherein the solution to the linear system represents a substantially linear relationship between the kernel set and the signal component of the second signal sequence arising from the first signal sequence..
Double exponential mechanism controlled transistor
The present disclosure relates to a tunnel fet device with a steep sub-threshold slope, and a corresponding method of formation. In some embodiments, the tunnel fet device has a dielectric layer arranged over a substrate.
National Taiwan University
Minimizing information leakage during modular exponentiation and elliptic curve point multiplication
Minimizing information leakage during modular exponentiation using random masks is disclosed minimizing information leakage during elliptic curve point multiplication is disclosed with windowing by using point randomization is disclosed. Elliptic curve point multiplication with windowing calculates and stores multiple points based on the point being multiplied and then processes multiple bits of the multiplier at a time is also disclosed..
The Athena Group, Inc.
System and probabilistic relational clustering
Relational clustering has attracted more and more attention due to its phenomenal impact in various important applications which involve multi-type interrelated data objects, such as web mining, search marketing, bioinformatics, citation analysis, and epidemiology. A probabilistic model is presented for relational clustering, which also provides a principal framework to unify various important clustering tasks including traditional attributes-based clustering, semi-supervised clustering, co-clustering and graph clustering.
The Research Foundation For The State University Of New York
Method and big data cloud storage resource management
A system and method for storage resource management that improves the efficiency of big data cloud storage management using copy-on-write/read snapshots to redirect the i/o requests without moving the virtual disk is disclosed herein. The system includes storage pools, a virtualized server, and a centralized data center management server.
University Of Florida Research Foundation, Incorporated
Dna methylation analysis
Disclosed herein are methods for determining whether one or more cpg dinucleotides are methylated using linear after the exponential polymerase chain reaction (“late-pcr”) or linear-expo-linear polymerase chain reaction (“lel-pcr”).. .
Server-assisted secure exponentiation
In one embodiment, a method for secure computation, includes receiving in a server, over a communication channel from a device external to the server a request to perform a modular exponentiation operation in which an exponent of the operation comprises a secret value, wherein the secret value is not provided to the server, and at least two parameters that encode the secret value in accordance with a polynomial or matrix homomorphic encryption of the secret value computed by the device, and performing in the server, in response to the request, a homomorphic exponentiation using the at least two parameters received from the device without decrypting the secret value in the server, so as to generate an output that is indicative of a result of the modular exponentiation operation.. .
Cisco Technology, Inc.
Estimating a tempo metric from an audio bit-stream
The invention relates to estimating tempo information directly from a bitstream encoding audio information, preferably music. Said tempo information is derived from at least one periodicity derived from a detection of at least two onsets included in the audio information.
Dolby International Ab
A temperature dependent oscillator charges a capacitance from a voltage source through a switch. The switch is opened and the capacitance discharges through a transistor having a temperature dependent resistance.
Advanced Micro Devices, Inc.
Plasma processing apparatus, data processing apparatus and data processing method
According to an embodiment of the present invention, a plasma processing apparatus includes: a processing chamber in which plasma processing is performed to a sample; a radio frequency power source that supplies radio frequency power for generating plasma in the processing chamber; and a data processing apparatus that performs processing to light emission data of the plasma. The data processing apparatus performs the processing to the light emission by using an adaptive double exponential smoothing method for varying a smoothing parameter based on an error between input data and a predicted value of smoothed data.
Hitachi High-technologies Corporation
Method for inverse tone mapping of an image
Method comprising, for each pixel, obtaining a pixel expansion exponent value (e′(p)) by low pass filtering luminance values of colors of pixels in its spatial neighborhood, obtaining a pixel luminance-enhancement value (yenhance(p)) by extraction of high frequencies of luminance values of colors of pixels in its spatial neighborhood, and then inverse tone mapping the luminance (y(p)) according to the equation yexp(p)=y(p)e′(p)×[yenhance(p)]c.. .
Protecting the input/output of modular encoded white-box rsa
A method of obscuring the input and output of a modular exponentiation function, including: receiving modular exponentiation parameters including an exponent e having n bits and a modulus m; generating randomly a pre-multiplier; calculating a post-multiplier based upon the pre-multiplier, exponent e, and modulus m; multiplying an input to the modular exponentiation function by the pre-multiplier; performing the modular exponentiation function; and multiplying the output of the modular exponentiation function by the post-multiplier, wherein multiplying an input to the modular exponentiation function by the pre-multiplier, performing the modular exponentiation function, and multiplying the output of the modular exponentiation function by the post-multiplier are split variable operations.. .
White-box modular exponentiation
A method of obscuring software code implementing a modular exponentiation function, including: receiving modular exponentiation parameters including an exponent e having n bits; generating a bitwise exponent array and inverse bitwise exponent array; and generating modular exponentiation function operations using the bitwise exponent array, inverse bitwise exponent array, and n, wherein the generated modular exponentiation function operations are split variable operations.. .
Euv mirror and optical system comprising euv mirror
An euv mirror has a multilayer arrangement applied on a substrate. The multilayer arrangement includes a first layer group having ten or more first layer pairs.
Carl Zeiss Smt Gmbh
Radiography flat panel detector having a low weight x-ray shield and the production thereof
And ae(am241 60 kev) represents the absorption exponent of the x-ray absorbing layer relative to the about 60 kev gamma ray emission of am241; t represents the a thickness of the x-ray absorbing layer; e1, e2, e3, . .
Medium composition for culturing microalgae colony and use thereof
A medium composition for increasing the colony number or colony size of microalgae includes, as an effective component, a conditioned medium derived from culture solution during the exponential phase of microalgae in culture. A solid medium contains the medium composition.
Advanced Biomass R&d Center
Heating element powered by alternating current and heat generator accomplished by the heating element
Heating element (1) powered by alternating current and heat generator (43) comprising the heating element (1) and control electronics (9). The heating element has a hollow body housing (3) which is closed or provided with one or more openings, and at least two electrodes (5) which are insulated from said housing (1) and from each other by means of an insulating element (4).
Magnetic disk device and controlling magnetic disk
According to one embodiment, a controller of a magnetic disk device is configured to manage a first value representing the number of times of writing for each track on a magnetic disk. The controller detects a first off-track amount during writing for a first track that is a writing target track, calculates a second value exponentially increasing according to the detected first off-track amount, and adds the calculated second value to the first values of tracks adjacent to both sides of the first track..
Kabushiki Kaisha Toshiba
Extended use of logarithm and exponent instructions
Embodiments of the present disclosure are based on a recognition that some processors are configured with instructions to compute logarithms and exponents (i.e. Some processors include log and exp circuits).
Analog Devices, Inc.
Accumulation of floating-point values
An apparatus and method for generating a sum of floating-point input values are provided. To sum the values multiple partial sum floating-point values are maintained and the partial sum to which an input value may be added is selected by a least significant portion of the exponent of the input value.