Methods and devices for adaptive autonomous polynomial interpolation of time series data A method of performing maintenance. Data is received from a plurality of physical sensors that measure parameters of parts of the platform, wherein a data point is missing from the data. The Boeing Company

System for sharing a cryptographic key A system (200) for configuring a network device (300) for sharing a key, the shared key being • bits long, the system comprising:—a key material obtainer (210) for—obtaining in electronic form a first private set of bivariate polynomials (252, {hacek over (z)}″(,)), and a second private set of reduction integers (254, f″), with each bivariate polynomial in the first set there is associated a reduction integer of the second set, and a public global reduction integer (256, . . Koninklijke Philips N.v.

Nbase numbers to physical wire states symbols translation method System, methods and apparatus are described that facilitate a device to encode/decode data in a data communications interface coupled to a plurality of wires. The device determines a value of a sequence of data bits allocated to a frame, converts the value into a sequence of symbols associated with the frame, and transmits the sequence of symbols to a receiver. Qualcomm Incorporated


Modulo calculation using polynomials Hardware logic arranged to perform modulo calculation with respect to a constant value b is described. The modulo calculation is based on a finite polynomial ring with polynomial coefficients in gf(2). Imagination Technologies Limited

System and displaying weapon engagement feasibility Disclosed is a system and method for generating, in an aircraft (1) in flight, a display indicative of the feasibility of a weapon carried on the aircraft (1) successfully engaging a determined target (5, t) and/or the feasibility of a weapon carried on the target (5, t) successfully engaging the aircraft (1). The method comprises: using a performance envelope of the weapon and performance envelope(s) for one or more different types of aircraft (1), determining a further performance envelope specifying the performance of the weapon when carried by any of the different aircraft (1) types; determining coefficients for a generic polynomial that fit the generic polynomial to the further performance envelope; uploading, to the aircraft (1), the generated coefficients; and, on the aircraft (1), reconstructing the further performance envelope and generating the feasibility display.. Bae Systems Plc

Memory controller, semiconductor memory device, and control semiconductor memory device A memory controller is a memory controller including an encoder that productcodes, with a linear code, data to be recorded in a memory section and a decoder that decodes productcoded data read out from the memory section. The encoder and the decoder share a parity generation circuit including a plurality of remainder calculating and retaining sections, each including a remainder calculation circuit by a generator polynomial and a retaining circuit that retains an output of the remainder calculation circuit.. Kabushiki Kaisha Toshiba

Configurable multilane scrambler for flexible protocol support Various structures and methods are disclosed related to configurable scrambling circuitry. Embodiments can be configured to support one of a plurality of protocols. Altera Corporation

Policybased key sharing Methods of providing policy based access to master keys, enabling keys to be distributed to groups of users in a secure manner while minimizing disruptions to the user in the event of changes to group membership or changes to user attributes. User attributes are identified. Oracle International Corporation

Method for acquiring parameters of dynamic signal The application discloses a method for acquiring parameters of a dynamic signal, including: selecting a dynamic sample signal sequence of a power grid to constitute an autocorrelation matrix; determining an effective rank of the autocorrelation matrix and the number of frequency components of the dynamic sample signal sequence; establishing an ar model, and solving a model parameter of the ar model; determining an expression and a complex sequence of the dynamic sample signal sequence by using a prony algorithm, wherein the dynamic sample signal sequence is represented by the complex sequence with a minimum square error; and substituting a root of a characteristic polynomial corresponding to the model parameter into the complex sequence and solving various parameters of the dynamic sample signal sequence. In the application, with the idea of ar parameter model, a current signal is considered to be a linear combination of signals at previous time points.. Chongqing University

Cryptographic processing device and cryptographic processing method A cryptographic processing device includes a processor that generates a first encrypted polynomial, a receiver that receives cryptographic information representing a fourth encrypted polynomial, and cryptographic information representing a second random number, the fourth encrypted polynomial including a first operation result that is a result of an operation of a fifth vector and a sixth vector, the first operation result being obtained by a second encrypted polynomial and a third encrypted polynomial, wherein the second encrypted polynomial is obtained based on the first encrypted polynomial, the second random number, and a second polynomial that corresponds to a third vector obtained by adding zero to the second vector, and the third encrypted polynomial is obtained based on the fifth vector obtained by adding zero to a fourth vector. The processor generates a second operation result that is a result of an operation of the second vector and the fourth vector.. Fujitsu Limited

Radio frequency receiver capable of determining a noise estimate in case of received power unbalanced antennas and operating thereof The present application suggests a receiver and a method of operating thereof for determining a noise estimate based on a radio frequency signal from an interference source over different propagation paths through a plurality of antennas. A covariance matrix estimator coupled through separate processing paths to a respective one of the plurality of antennas is arranged to determine an estimate of a covariance matrix based on the received radio frequency signal. Freescale Semiconductor, Inc.

Encoding method, decoding method An encoding method generates an encoded sequence by performing encoding of a given coding rate according to a predetermined parity check matrix. The predetermined parity check matrix is a first parity check matrix or a second parity check matrix. Sun Patent Trust

Memory controller, memory system, and decoding method A memory controller includes: an encoder configured to generate a block product code which includes a first code and a second code as component codes, the first code and the second code being linear cyclic codes; a memory interface configured to write the block product code to a nonvolatile memory, and to read a received word from the nonvolatile memory; and a decoder configured to perform a decoding using a code constraint corresponding to a generator polynomial as a common divisor between a generator polynomial of the first code and a generator polynomial of the second code with respect to a symbol of an area which is not subjected to a code constraint of the first code but subjected to a code constraint of the second code.. . Kabushiki Kaisha Toshiba

Behavioral model and predistorter for modeling and reducing nonlinear effects in power amplifiers The behavioral model and predistorter for modeling and reducing nonlinear effects in power amplifiers addresses the model size estimation problem. The gmp model is replaced by the hybrid memory polynomial/envelope memory polynomial (hmem) model within a twin nonlinear twobox structure to reduce the number of variables involved in the model size estimation problem, without compromising model accuracy and digital predistorter performance. King Fahd University Of Petroleum And Minerals


Threedimensional positioning method A threedimensional positioning system includes establishing a geometric model for optical and radar sensors, obtaining rational function conversion coefficients, refining the rational function model and positioning threedimensional coordinates. The system calculates rational polynomial coefficients from a geometric model of optical and radar sensors, followed by refining a rational function model by determined ground control points and object image space intersection. National Central University

Filter for network intrusion and virus detection Methods and apparatus to perform string matching for network packet inspection are disclosed. In some embodiments there is a set of string matching slice circuits, each slice circuit of the set being configured to perform string matching steps in parallel with other slice circuits. Intel Corporation

Key sharing device and system for configuration thereof A method of configuring a network device for key sharing and a method for a first network device to determine a shared key are provided. The method of configuring uses a private private modulus, and a modulus (p1) a public modulus (n), and a bivariate polynomial (f1) having integer coefficients, the binary representation of the public modulus and the binary representation of the private modulus are the same in at least key length (b) consecutive bits. Koninklijke Philips N.v.

Secondary synchronization codebook for eutran Providing for secondary synchronization encoding utilizing a primary synchronization channel (psch)related scrambling code is described herein. Scrambled secondary synchronization codes (sscs) can be assigned to multiple base stations of a radio access network (ran). Qualcomm Incorporated

Transmitting method and transmitting apparatus A lowdensity parity check convolution code (ldpccc) is made, and a signal sequence is sent after being subjected to an errorcorrecting encodement using the lowdensity parity check convolution code. In this case, a lowdensity parity check code of a timevariant period (3g) is created by linear operations of first to 3gth (letter g designates a positive integer) parity check polynomials and input data.. Panasonic Corporation


Simultaneous edge enhancement and nonuniform noise removal using refined adaptive filtering A method for denoising magnetic resonance images includes estimating a normalization field corresponding to a magnetic resonance imaging device and acquiring a nonnormalized image from the magnetic resonance imaging device. A noise level estimation process is performed with the nonnormalized image to yield a noise level. Siemens Aktiengesellschaft

Method and system for lithography processwindowmaximizing optical proximity correction An efficient opc method of increasing imaging performance of a lithographic process utilized to image a target design having a plurality of features. The method includes determining a function for generating a simulated image, where the function accounts for process variations associated with the lithographic process; and optimizing target gray level for each evaluation point in each opc iteration based on this function. Asml Netherlands B.v

Geographical condition prediction A method and system for forecasting the conditions of locations is provided. The method includes receiving in real time from a user in a specified location, a specified future timeframe associated with a future condition of the specified location. International Business Machines Corporation

Gas turbine engine airfoil An airfoil for a turbine engine includes pressure and suction sides that extend in a radial direction from a 0% span position at an inner flow path location to a 100% span position at an airfoil tip. The airfoil has a relationship between a total chord length and a span position and corresponds to a curve that has an increasing total chord length from the 0% span position to a first peak. United Technologies Corporation

Multivariate public key signature/ verification system and signature/verification method Multivariate public key signature/verification system including a signature module and a verification module. The signature module contains a processor, first affine transformation inversion component, isomorphic inversion component, trapdoor component, isomorphic component, and second affine transformation inversion component. South China University Of Technology


Method and system for homomorphicly randomizing an input In one embodiment, a method for reducing information leakage in order to counter side channel attacks against a secure execution environment is described, the method including receiving at the secure execution environment a first input comprising a key comprising a sequence of k input elements in a commutative ring, cr, receiving at the secure execution environment a second input comprising a text comprising a sequence of p input elements in the commutative ring, cr, defining an input inp comprising a sequence of j input elements, wherein inp comprises either one or both of the first input or the second input, performing one of a matrix randomization operation or a polynomial randomization operation on the inputs, and producing a randomized output.. . Cisco Technology, Inc.

Encoding apparatus, transmission apparatus, encoding method and transmission method An encoding method and encoder of a timevarying ldpccc with high error correction performance are provided. In an encoding method of performing low density parity check convolutional coding (ldpccc) of a time varying period of q using a parity check polynomial of a coding rate of (n−1)/n (where n is an integer equal to or greater than 2), the time varying period of q is a prime number greater than 3, the method receiving an information sequence as input and encoding the information sequence using equation 1 as a gth (g=0, 1, . Panasonic Intellectual Property Corporation Of America

Iterative decoding lfsr sequences with a low falsealarm probability A messagepassing iterative decoding method of an associated lfsr sequence (or msequence) as a simplex code, to a parity matrix h. The method includes determining a set of parity polynomials with a low weight obtained by combining the parity equations of the matrix h. Commissariat A L'energie Atomique Et Aux Energies Alternatives

Methods and calculating electromagnetic scattering properties of a structure and for reconstruction of approximate structures A method of calculating electromagnetic scattering properties of a structure, the structure including materials of differing properties and the structure being periodic in at least one lateral direction and extending in a vertical direction, comprises: numerically solving a volume integral equation for electromagnetic scattering for a plurality of modes in the at least one lateral direction, by performing, for each respective mode, integration (1350) of a pseudospectral polynomial (chebyshev) expansion in the vertical direction multiplied by a id green's function using the same sample points in the orthogonal direction for all of the plurality of modes. The integration is performed by solving a regularized linear system of equations between first (1116) and second (1120) discrete transformation steps to compute (1118) values of a regularized chebyshev expansion coefficient vector (γ). Asml Netherlands B.v.

A method and a device for determining the mass flow rate and the presence or absence of a liquid flowing in a pipe A device (1) for determining the mass flow rate of milk turbulently flowing with air in a pipe (2) in pulsed milk slugs comprises sampling a signal from a microphone (8) of the device (1) indicative of sonic signals produced by the milk flow. The sampled signals are read by a microprocessor (15) which applies a fast fourier transform to the sampled signal to produce the frequency domain of the sampled signal. Dairymaster

System and encoding and controlled authentication A system and method for encoding and controlled authentication of security documents, id cards, tickets and products and the like is described which can provide a secure means to determine them to be authentic. The method involves encoding the surface of the said security documents or id cards or tickets and the like with of a pair of identity components comprising a pair of unique numbers, or a combination of a uniquely encoded image and a unique number, or a combination of a unique barcode and a unique number, or a combination of encoded images.

Frequencydivision multiplexing (fdm) using soft clipping (sc) A method comprising mapping data onto odd frequency subcarriers of a plurality of nonoverlapping frequency subcarriers, wherein each of the nonoverlapping frequency subcarriers comprises a center frequency that is an odd integer multiple of a lowest center frequency, producing a time signal based on the mapping, applying soft clipping (sc) to signal amplitudes of the time signal according to a polynomial function, and producing a positiveamplitude signal based on the applying.. . Futurewei Technologies, Inc.

Method for the correction of electron proximity effects A method for projecting an electron beam onto a target includes correction of the scattering effects of the electrons in the target. This correction is made possible by a calculation step of a point spread function having a radial variation according to a piecewise polynomial function.. Aselta Nanographics

Wafer inspection with focus volumetric method Disclosed are methods and apparatus for detecting defects in a semiconductor sample. An inspection tool is used to collect intensity data sets at a plurality of focus settings from each of a plurality of xy positions of the sample. Klatencor Corporation

Method and efficiently implementing the advanced encryption standard Implementations of advanced encryption standard (aes) encryption and decryption processes are disclosed. In one embodiment of sbox processing, a block of 16 byte values is converted, each byte value being converted from a polynomial representation in gf(256) to a polynomial representation in gf((22)4). Intel Corporation


Cryptographic processing device and cryptographic processing method A memory stores therein a first vector. A processor generates a first encrypted polynomial by encrypting a first polynomial that corresponds to a first binary vector obtained by performing a binary transformation on elements of the first vector. Fujitsu Limited

Clusters of polynomials for data points A method, system and storage device are generally directed to determining for each of a plurality of data points, a neighborhood of data points about each such data point. For each such neighborhood of data points, a projection set of polynomials is generated based on candidate polynomials.

Digital modulator nonlinearity correction A nonlinear distorter is configured to mitigate nonlinearity from a nonlinear component of a nonlinear system. The nonlinear distorter operates to model the nonlinearity as a function of a piecewise polynomial approximation applied to segments of a nonlinear function of the nonlinearity.

Cryptographic processing device and cryptographic processing method A memory stores therein first cryptographic information that represents an encrypted polynomial obtained by encrypting a first polynomial that corresponds to a first vector. From a terminal that receives second cryptographic information that represents an encrypted monomial obtained by encrypting a monomial generated by use of a random number, a receiver receives third cryptographic information that represents an encrypted result obtained by encrypting a result of a multiplication of a second polynomial that corresponds to a second vector by the monomial. Fujitsu Limited

Offaxis threemirror optical system with freeform surfaces An offaxis threemirror optical system with freeform surfaces includes a primary mirror, a secondary mirror, a tertiary mirror, and an image sensor. The primary mirror receives light rays first and the secondary mirror is located on a path of light reflected from the primary mirror. Hon Hai Precision Industry Co., Ltd.

Privacy preserving setbased biometric authentication A method includes extracting a set of enrollment feature points from an enrollment biometric measurement. The method also includes randomly selecting one or more enrollment code words from an error correction code. Fujitsu Limited

Homomorphic evaluation including key switching, modulus switching, and dynamic noise management A homomorphic evaluation of a function is performed on input ciphertext(s), which were encrypted using an encryption scheme that includes multiple integer moduli. Each ciphertext contains one or more elements of an mth cyclotomic number field, where m is an integer. University Of Bristol

Surface patch techniques for computational geometry A method and system for computer aided design (cad) is disclosed for designing geometric objects, wherein interpolation and/or blending between such objects is performed while deformation data is being input. Thus, a designer obtains immediate feedback to input modifications without separately entering a command(s) for performing such deformations. Freedesign, Inc.

Method, apparatus and program product for prediction Technology for predictions of a value over time which relies upon and implements a topologic space and surface analysis enabling insertion of future dates and generation of more accurate predictive values for resource demand and other values of interest for analysis. polynomial equations are generated from the surface analysis by regression and factoring to enable forecasting and acknowledgment of various factors such as weather and the like..

Ultrasound for representing the propagation of ultrasound waves in a guide of linearly variable thickness Device for the representation, in a frequencywave number reference frame fk, of the propagation of an ultrasound wave in a dihedral guide (1), which comprises ultrasound emitters (2) referenced by “ej” with j an integer varying between 1 and n, n a strictly positive integer and ultrasound receivers (3) referenced by “ri” with i an integer varying between 1 and m, m a strictly positive integer, the receivers being disposed spatially over a first segment of a straight line according to a regular pitch “a”, which comprises means for processing the signal received by the receivers, originating from the emitters, and in which the processing means comprise means for calculating a modified discrete spatial fourier transform, for a spatial integration variable “x”, centered in the middle of said first segment and running through the receivers in the direction of increasing x, and for a wave vector k(x) equal to a product k.p(x), with k a constant coefficient in x and included between 0 and 2*pi/a, and with p(x) a polynomial in x, of coefficient of degree 0 in x equal to 1 and of coefficient “c” of degree 1 in x such that c.a lies between − 1/10 and + 1/10. . Université Pierre Et Marie Curie  Paris 6


System and estimating material density A method implemented using one or more computer processors for estimating the density of a material in an annular space includes receiving detector data representative of scattered photons resulting from interaction of a material in an annular space with radiation from a radiation source and detected by a plurality of radiation detectors. The method further includes performing a set of monte carlo simulations and generating polynomial models of the detector data based on the set of monte carlo simulations. General Electric Company

System for sharing a cryptographic key A system (200) for configuring a network device (300) for key sharing is provided, and a first (300) and second network device configured to determine a shared key between them. The system comprises a key material obtainer (210) for obtaining in electronic form a public global reduction polynomial (216, n(t)), a first private set of bivariate polynomials (212, fi(,)), and a second private set of reduction polynomials (214, qi(t)), with each bivariate polynomial in the first set a reduction polynomial of the second set being associated, and a polynomial manipulation unit (220) for computing a univariate private key polynomial (228) from the first and second private sets by mapping an identity number (a) of the network device to an identity polynomial, obtaining a set of univariate polynomials by for each particular polynomial of the first private set, substituting the identity polynomial (a) into said particular polynomial fi(a,) and reducing modulo the reduction polynomial associated with said particular polynomial, and summing the set of univariate polynomials, the system is configured for electronically storing the generated univariate private key polynomial (228, 236) and the public global reduction polynomial (216, n(t)) at the network device. Koninklijke Philips N.v.

Signal segmentation method and crc attachment reducing undetected error The present invention provides for applying a cyclic redundancy check (crc) to a data signal. The present invention includes attaching a first crc to a first data signal block having a first length, segmenting the first data signal block attached with the first crc into a plurality of second data signal blocks having a length shorter than the first length, respectively generating a second crc for each second data signal block, and attaching the generated second crc to the respective second data signal block. Lg Electronics Inc.

Touch panel device and correcting coordinates on touch panel A touch panel device includes: a detection unit that detects coordinates of a pressed point on an input surface of a touch panel; and a correction unit that corrects the coordinates detected by the detection unit to obtain corrected coordinates, wherein the correction unit approximates, when a predetermined number of reference points arranged on the input surface are pressed, curves passing through coordinates of the reference points by second order or higher order polynomial equations, specifies, when an arbitrary point on the input surface is pressed, a region including coordinates of the arbitrary point from regions obtained by dividing the input surface by the curves, calculates distances from the coordinates of the arbitrary point to curves that define the specified region among the curves with the second order or higher order polynomial equations, and calculates the corrected coordinates based on a location of the specified region and the distances.. . Fujitsu Component Limited

Electronic signature system Electronic signature system comprising an electronic key generation device (100) for generating a digital signingkey for digitally signing digital data and a corresponding verificationkey for digitally verifying said digitally signed data, an electronic signature generation device (200) for generating a digital signature for digital data using a digital signingkey obtained from an electronic key generation device, and an electronic signature verification device (300) for verifying a digital signature generated by an electronic signature generation device. The verifier has access to a commitment integer and corresponding polynomial derived from private keying material, enabling verification of signature polynomials derived the same private keying material.. Koninklijke Philips N.v.


Multidimensional encryption A method of encrypting data is provided. The method includes generating a key and encrypting data using the key. Unsene, Ehf.

Access control in a network The teachings relates to a method 200 performed in a processor 30, 32 for calculating a 10 bits cyclic redundancy check, crc, value for a message m(x). The method 200 comprises: determining 201 length of the message to be greater than 64 bits; adapting 202 the message 5 m(x) to have a length of n*128 bits, wherein n is a positive integral number, folding 203, n1 times, of 128 bits by using a pclmulqdq instruction comprising performing a carryless multiplication of two 64bits operands; folding 204 of 64 bits by using the pclmulqdq instruction, providing a 64 bit message m′(x); 10 wherein the folding 203 of 128 bits and folding 204 of 64 bits are adapted for use of the pclmulqdq instruction to calculate a 10 bit crc by: adapting degree of p(x) k(x) to 32 by setting k(x)=x22, wherein p(x) is a polynomial of degree 10, and wherein □ denotes the carryless multiplication, and performing the folding of 128 bits 15 and folding of 64 bits by [m(x)∥x22]mod[p(x). x22]; calculating 205 the 10 bits payload crc value for the message m(x) by using a crc10 tablelookup algorithm.

Method for using a computer graphics system for changing the shape of the surface of models of geometric solids with the aid of deformation and device for implementing same The proposed method for using a computer graphics system for changing the shape of models of geometric solids with the aid of deformation is characterized in that it is used for producing geometric solids which mate with one another as they were relative to one another and have mating surfaces, which require manufacture with precision accuracy (up to 10 micrometres), for example toothed screws (cylindrical, conical) of a screw compressor unit, gear trains, gears of a gear pump and similar mating pairs of geometric solids. The proposed method consists in that deformation of a model (3) of a semifinished product (3) of a first mating solid (1) is performed with the aid of a model (7) of a first tool (7), whose surface is automatically calculated using several mathematical laws, each of which is a polynomial in which at least one of the coefficients represents one of several characteristics defining the geometry of the shape of the surface of the second geometric solid (2). Vert Rotors Uk Limited

Prediction using method, apparatus and program product Technology for predictions of a value over time which relies upon and implements a topologic space and surface analysis enabling insertion of future times and generation of more accurate predictive values for resource demand and other values of interest for analysis. The topological surface is generated on a cylindrical coordinate system.

Vector based geophysical modeling of subsurface volumes Method and system are described for modeling one or more geophysical properties of a subsurface volume. The method includes computing vector volumes from geophysical data to enhance subsurface features, where the vectors may be estimated by steps, including the following.

Method to incorporate skin and core material properties in performance analysis of high pressure die casting aluminum components A method, device and article of manufacture for determining properties in a high pressure die cast component. Upon receipt of geometric information that corresponds to a location of interest within the component, a raytriangle intersection relationship is used to calculate a wall thickness of the location of interest; this relationship is simplified by being used in conjunction with an octreebased relationship. Gm Global Technology Operations Llc

Manufacture of nonrectilinear features Methods and apparatus are disclosed for symbolic methods using algebraic geometry (e.g., based on a gröbner basis of tangent space polynomials of parametric curves). For example, the design, optimization and verification of silicon photonic wave guides using parametric polynomials and/or gröbner basis functions can be used to perform envelope generation, rectification, manufacturability checking, singularity detection, reticle and etch processing model generation, tapering loss minimization, and bend loss minimization. Mentor Graphics Corporation

Methods for objectively determining the visual axis of the eye and measuring its refraction Provided herein are methods for objectively determining a visual axis of an eye. An optical axis of a measuring instrument is aligned with an unambiguously determinable axis of the eye which is the pupillary axis crossing the vertex of an anterior surface of a cornea and perpendicular to the vertex. Tracey Technologies, Corp.

Adaptive reshaping for layered coding of enhanced dynamic range signals An encoder receives an input enhanced dynamic range (edr) image to be coded in a layered representation. Input images may be gammacoded or perceptuallycoded using a bitdepth format not supported by one or more video encoders. Dolby Laboratories Licensing Corporation

Fast calibration A computer implemented method of calibrating a device comprising the steps of: deriving an analytic expression for a variable to be optimised of the device in terms of at least one parameter of the device, transforming the analytic expression into polynomial form of the at least one parameter of the device, the polynomial form comprising n coefficients, capturing at least n samples of a value of the variable from the device under calibration, each sample being a result of a different independent predetermined value of the at least one parameter, applying the captured variable values and the corresponding at least one parameter values to the polynomial form, obtaining optimal values of the at least one parameter from the applying step to calibrate the device.. . Sequans Communications S.a.


Encoding method, and decoding method An encoding method generates an encoded sequence by performing encoding of a given coding rate according to a predetermined parity check matrix. The predetermined parity check matrix is a first parity check matrix or a second parity check matrix. Panasonic Intellectual Property Corporation Of America

Weighted memory polynomial power amplifiers predistortion A system and method for linearizing a power amplifier using digital predistortion technique is provided including processing circuitry, the processing circuitry configured to apply a digital predistortion function based on a weighted static polynomial function, a weighted dynamic polynomial function and a threshold parameter which splits the nonlinear transfer characteristics of the device under test into a region where the static nonlinearity predominates and a region where the dynamic distortions predominate.. . King Fahd University Of Petroleum And Minerals

Fast, energyefficient exponential computations in simd architectures In one embodiment, a computerimplemented method includes receiving as input a value of a variable x and receiving as input a degree n of a polynomial function being used to evaluate an exponential function ex. A first expression a*(x−ln(2)*kn(xf))+b is evaluated, by one or more computer processors in a single instruction multiple data (simd) architecture, as an integer and is read as a double. International Business Machines Corporation

Fast, energyefficient exponential computations in simd architectures In one embodiment, a computerimplemented method includes receiving as input a value of a variable x and receiving as input a degree n of a polynomial function being used to evaluate an exponential function ex. A first expression a*(x−ln(2)*kn(xf))+b is evaluated, by one or more computer processors in a single instruction multiple data (simd) architecture, as an integer and is read as a double. International Business Machines Corporation

Method and publickey encrypted communication A method and an apparatus for publickey encrypted communication includes: encrypting, by a first device, random information according to a first public key to obtain a first ciphertext; encrypting, by the first device, plaintext information according to a second public key to obtain a second ciphertext, where the plaintext information is unencrypted data to be sent by the first device to a second device, the first public key is represented in a form of a polynomial, the first public key is obtained through calculation on a truncated polynomial ring according to system parameters, the second public key is represented in a form of a polynomial, the second public key is randomly selected on a truncated polynomial ring, and the random information is randomly selected on a truncated polynomial ring; and sending, by the first device, the first ciphertext and the second ciphertext to the second device.. . Huawei Technologies Co.,ltd.

Polynomial texture mapping and reflectance transformation imaging apparatus and techniques An image enhancement device and related techniques in support of polynomial texture mapping (ptm) (also known as reflectance transformation imaging (rti)) photography. The device may include a number of pod legs that extend from a camera focal plane to a base location around an object of interest.

Open loop correction for optical proximity detectors An optical proximity detector includes a driver, light detector, analog frontend, sensor(s) that sense correction factor(s) (e.g., temperature, supply voltage and/or forward voltage drop), and a digital back end. The driver drives the light source to emit light. Intersil Americas Llc

Systems and methods for measurement of input current of voltage regulator In accordance with embodiments of the present disclosure, an information handling system may include an information handling resource, a voltage regulator, a nontransitory computerreadable medium, and a controller. The voltage regulator may be coupled to the information handling resource and configured to deliver electrical energy to the information handling resource. Dell Products L.p.

Method for measuring the plasma concentration of an analyte directly on a whole blood sample Where dp is the corrected analyte amount, dst is the measured analyte amount, dh is the measured haematocrit level, and pa is a nonconstant polynomial of a degree greater than or equal to 1 having as indeterminate values the measured analyte amount, dst, and the measured haematocrit level, dh, and having its polynomial coefficients depending on the analyte.. .

Mask blank substrate, mask blank, transfer mask, and manufacturing semiconductor device A virtual reference surface that becomes an optically effective flat reference surface defined by a zernike polynomial which is composed of only terms in which the order of a variable related to a radius is the second or lower order, and includes one or more terms in which the order of the variable related to the radius is the second order is set, and a mask blank substrate satisfying the condition that data (pv value) relating to the difference between the maximum value and the minimum value of the difference data between the reference surface and the measured shape of the mask blank substrate is oneeighth or less of an exposure wavelength (a) is selected.. .

Implementing fixedpoint polynomials in hardware logic A method implements fixedpoint polynomials in hardware logic. In an embodiment the method comprises distributing a defined error bound for the whole polynomial between operators in a dataflow graph for the polynomial and optimizing each operator to satisfy the part of the error bound allocated to that operator. Imagination Technologies Limited

Phase locked loop with modified loop filter A loop filter in a modified phase locked loop has a proportional path generating first output signal that is proportional to an input signal and an integral path for generating a second output signal that is an integral of the input signal. An additional functional path generates a third output signal that is a predetermined function of the input signal. Microsemi Semiconductor Ulc

Techniques for distributing secret shares Various embodiments are generally directed to an apparatus, method and other techniques generating one or more polynomial elements for a polynomial function using a node value of a pseudo random number generator tree as a seed value, the polynomial function comprising a secret value and the polynomial elements, and the pseudo random number generator tree at least partially matching at least one other pseudo random number generator tree on another device, generating a plurality of share values based on the one or more polynomial elements and the polynomial function and distributing a share value of the plurality of share values to a device.. .

Sample rate converter and converting sample rate A sample rate converter and a method of converting a sample rate are disclosed herein. The sample rate converter includes a data delay unit, a clock rate conversion unit, a lagrange polynomial filter unit, a resample position calculation unit, and a resample position compensation unit. Electronics And Telecommunications Research Institute

Ultrawideband frequency position modulation using nonlinear compressed sensing A frequency position modulation system for encoding signals for transmission. A signal's discrete frequency support is used to represent symbols. The Government Of The United States Of America, As Represented By The Secretary Of The Navy

Systems and methods for computing mathematical functions Mathematical functions are computed in a single pipeline performing a polynomial approximation (e.g. A quadratic approximation, or the like) using data tables for rcp, sqrt, exp or log using a single pipeline according and opcodes. Vivante Corporation

Encrypting and decrypting information An example information encryption method that includes acquiring tobeencrypted information and converting the tobeencrypted information into a polynomial of a predetermined format; extracting biometric information, and acquiring biometric data; and substituting the biometric data into the polynomial for calculation to acquire a value of the polynomial and using a twodimensional dataset including the biometric data and the value of the polynomial corresponding to the biometric data as first encrypted information. The techniques of the present disclosure improve the security of information encryption, and reduce the risk of illegal decryption of encrypted information.. Alibaba Group Holding Limited

Evaluation of polynomials with floatingpoint components A method identifies a floating point implementation of a polynomial that is accurately evaluable. The method comprises determining whether the polynomial has an allowable variety defined by a plurality of subvarieties, and, if so, partitioning the input domain of the polynomial into a plurality of subdomains about the subvarieties. Imagination Technologies Limited

Multidimension variable predictive modeling for yield analysis acceleration In one example, a method for evaluating a system includes constructing a macromodel of the system comprising a multipleorder polynomial equation that defines a boundary between at least one failure region and a nonfailure region for a performance indicator with respect to at least one variable of the system. The method further includes obtaining importance samples for the at least one variable that are biased to the at least one failure region, and calculating indicator values for the performance indicator by applying the importance samples to the macromodel.. International Business Machines Corporation

Lee metric error correcting code A memory device may include memory components for storing data. The memory device may also include a controller that determines whether one or more errors exist in a data packet stored in the memory components. Micron Technology, Inc.

Error detecting device and error detecting method An error detecting device includes a memory that stores therein first remainders corresponding to a plurality of bit positions p×p (p is an integer equal to or greater than zero) at a predetermined bit interval p among all of remainders obtained by dividing monomials, which correspond to the respective bit positions in a bit string represented by a polynomial, by a generator polynomial for generating an error detecting code, and a processor configured to acquire, from the memory, the first remainders corresponding to p×p of p×p+q (q is an integer equal to or greater than zero and smaller than p) representing normal bit positions of bits of 1 among all of the bits of an input bit string, obtain a cumulative addition result by shifting each of the acquired first remainders by q bits to obtain shift results.. . Fujitsu Limited

Method for acquiring a gold sequence by double iterative decoding A method for acquiring a gold code, obtained as a sum of a first msequence (x) and a second msequence (yi), the first msequence being generated by a first generator polynomial (gx) and the second msequence being generated by a second generator polynomial (gy), the weight of the first generator polynomial being lower than the weight of the second generator polynomial, the acquiring method involving a first step of message passing decoding according to a first bipartite graph the edges of which are determined by the coefficients of the first generator polynomial, a decimation step using a predetermined decimation factor, and a second step of message passing decoding according to a second bipartite graph the edges of which are determined by a third generator polynomial having a minimum weight generating a third msequence having the same length as that of the second msequence.. . Commissariat A L'energie Atomique Et Aux Energies Alternatives

Distorted image correction apparatus and method With regard to a distortion correction apparatus and method which are applicable to hardware for realtime distortion correction, provided are a distorted image correction apparatus and method for correcting a distortion of an image by using a nonpolynomial estimation function suitable for a hardware operation, and for correcting the distortion of the image by utilizing a morphing form.. . Nextchip Co., Ltd.

Design and analysis of silicon photonics array wave guides Methods and apparatus are disclosed for symbolic methods using algebraic geometry (e.g., based on a gröbner basis of tangent space polynomials of parametric curves). For example, the design, optimization and verification of silicon photonic wave guides using parametric polynomials and/or gröbner basis functions can be used to perform envelope generation, rectification, manufacturability, singularity detection, reticle and etch processing model generation, tapering loss minimization, and bend loss minimization. Mentor Graphics Corporation

Encoding method, decoding method An encoding method generates an encoded sequence by performing encoding of a given coding rate according to a predetermined parity check matrix. The predetermined parity check matrix is a first parity check matrix or a second parity check matrix. Panasonic Intellectual Property Corporation Of America

Digital predistortion and postdistortion based on segmentwise piecewise polynomial approximation A nonlinear distorter is configured to mitigate nonlinearity from a nonlinear component of a nonlinear system. The nonlinear distorter operates to model the nonlinearity as a function of a piecewise polynomial approximation applied to segments of a nonlinear function of the nonlinearity. Infineon Technologies Ag

Harmonic encoding for fwi A deterministic method for selecting a set of encoding weights for simultaneous encodedsource inversion of seismic data that will cause the iterative inversion to converge faster than randomly chosen weights. The encoded individual source gathers are summed (83), forming a composite gather, and simulated in a single simulation operation.

Gas turbine engine airfoil An airfoil of a turbine engine includes pressure and suction sides that extend in a radial direction from a 0% span position at an inner flow path location to a 100% span position at an airfoil tip. The airfoil has a relationship between a tangential stacking offset and a span position that is at least a third order polynomial curve that includes at least one positive and negative slope. United Technologies Corporation

Tamper detector with hardwarebased random number generator A system includes a tamper detector that includes a linear feedback shift register (lfsr) for generating pseudorandom coded detection signals as a function of seed values and a generator polynomial. The generator polynomial is loaded from a controller to the lfsr via software, and the seed values are directly loaded from a hardwarebased random number generator to the lfsr. Freescale Semiconductor, Inc.

Secure data processing method and use in biometry The invention relates to a processing method, including the calculation of one function between a datum to be compared and a reference datum. The function can be written in the form of a sum of: a term that depends on the datum to be compared, a term that depends on the reference datum, and a polynomial, such that all the monomials of the polynomial include at least one coordinate of each datum. Morpho

Systems and methods for error correction coding Described are methods, systems, and apparatus, including computer program products for error correction coding and decoding procedures for data storage or transfer. A plurality of data blocks is received. Raidix Corporation

Audio processing An audio processing system (100) for spatial synthesis comprises an upmix stage (110) receiving a decoded mchannel downmix signal (x) and outputting, based thereon, an nchannel upmix signal (y), wherein 2≦m<n. The upmix stage comprises a downmix modifying processor (120), which receives the mchannel downmix signal and outputting a modified downmix signal (d1, d2) obtained by cross mixing and nonlinear processing of the downmix signal, and further comprises a first mixing matrix (130) receiving the downmix signal and the modified downmix signal, forming an nchannel linear combination of the downmix signal channels and modified downmix signal channels only and outputting this as the nchannel upmix signal. Dolby International Ab

Accurate curvature estimation algorithm for path planning of autonomous driving vehicle A method for identifying roadway curvature that includes determining a range of interest and collecting shape points from a map database from a current position of the vehicle to an end of the range of interest that define the location of the roadway. The method converts the shape points from world geodetic system 84 (wgs84) coordinates to utm coordinates, and then fits a single set of polynomial equations to define a curve using the converted shape points. Gm Global Technology Operations Llc

Method of controlling a transmission having an impeller clutch Impeller speed, which is difficult to measure when a torque converter includes an impeller clutch, is estimated based on a known relationship among impeller speed, turbine speed, and turbine torque. Turbine torque may be directly measured by a turbine torque sensor or estimated based on other measurements such as output shaft torque or vehicle acceleration. Ford Global Technologies, Llc

Polynomial constructing a nondeterministic (np) turing machine A nondeterministic turning machine (ntm) performs computations using a spatial binary enumeration system, a threedimensional relation system, a simulatedhuman logic system, and a bijectiveset memory system. The ntm may be used to perform a variety of computational tasks, such as multiple sequence alignment, factorization, and other nondeterministic polynomial algorithms in polynomial time.

Bestfit affinity sensorless conversion means or technique for pump differential pressure and flow monitoring The present invention provides apparatus, including a hydronic sensorless pumping system, that features a signal processor or processing module configured to receive signaling containing information about motor readout values of power and speed, and also about pump and system characteristics equations together with empirical power equations that are constructed by a polynomial bestfit function together with pump affinity laws based upon a pump curve published by a pump manufacturer; and determine corresponding signaling containing information about a pump or system pressure and a flow rate at the motor readout values of power and speed, based upon the signaling received.. . Fluid Handling Llc.

Spatial arithmetic sequence alignment A computer system aligns two or more sequences with each other to identify similarities and differences between the aligned sequences. The sequences may, for example, represent proteins.
