Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 7315

Full-Text Articles in Entire DC Network

Simulating Authentic User Personas To Generate Analytics For Evaluating Digital Products, Oded Elyada, Oriana Riva, Avia Aharon, Ido Hakimi, Ron Ziv, Danny Karmon Sep 2024

Simulating Authentic User Personas To Generate Analytics For Evaluating Digital Products, Oded Elyada, Oriana Riva, Avia Aharon, Ido Hakimi, Ron Ziv, Danny Karmon

Defensive Publications Series

It is challenging to acquire user data from a diverse set of adequate numbers of suitable real end users for design, evaluation, and improvement of a product. Involving real users in evaluation requires a sufficient level of product maturity. It is difficult to bootstrap and test personalization because it requires personal data. This disclosure describes techniques to overcome these limitations by generating synthetic data that mimics authentic digital and social user practices via simulated personas with local memory. The simulation utilizes the semantic understanding and reasoning capabilities of LLMs and includes interaction between the personas and various digital applications and …


The Composite Projection Configuration That Contains 8 Projection Configurations Which Are Collectively Configured In An Octagonal Configuration., Punarjeewa Abeysekera Sep 2024

The Composite Projection Configuration That Contains 8 Projection Configurations Which Are Collectively Configured In An Octagonal Configuration., Punarjeewa Abeysekera

Defensive Publications Series

This paper describes a composite projection configuration that contains 8 projection configurations which are collectively configured in an octagonal configuration. The composite projection configuration consists of 8 identical projection configurations. Each projection configuration will contain a video projecting display, a convex lens stack and an angled beam splitter. The composite projection configuration, by collectively utilizing the 8 identical projection configurations, will have the capability to project 8 projections onto the field of view of the user. And the composite projection configuration, by collectively utilizing the 8 projections, will have the capability to combine the 8 projections into a one single …


Spherical Radius Hanger Sep 2024

Spherical Radius Hanger

Defensive Publications Series

A surface wellhead assembly having an inner tubular insertable into an outer tubular, is described. A tubing hanger is provided on an outer surface of the tubing head housing for sealing between the hanger and housing. The contact sealing of tubing hanger has a shepherd.

When the inner tubular member is landed, a portion of the shepherd radius adjacent to the outer taper seal of tubing housing tapers radially inward into sealing contact when the tubing hanger or tubing housing is not perfect perpendicular.


Sick Mode Selection For Audio Control, Hp Inc Sep 2024

Sick Mode Selection For Audio Control, Hp Inc

Defensive Publications Series

During the online meeting, sometimes we cough or sneeze suddenly, and the sound will be transmitted to the online meeting through the microphone. To avoid having disruptive coughing sounds, throat clearing noises, and sneeze noise during online meetings, we would like to have a function to eliminate coughing sounds. We hope this function can directly remove the coughing noise from online meetings, allowing all participants to speak smoothly and listen clearly to each other's content.


Digital Ball Of Yarn For Indoor Positioning And Path Tracing, Manasa Babu Sep 2024

Digital Ball Of Yarn For Indoor Positioning And Path Tracing, Manasa Babu

Defensive Publications Series

Navigation through complex indoor environments can be disorienting, a problem that is compounded by limited accuracy of indoor positioning techniques. This disclosure describes techniques that enable users to digitally trace their path and to enable them to retrace their path from the destination back to the start point. With user permission, tracing starts when a user marks their present spot. Tracing the user’s path is based on data from various sensors on a smartphone, wearable device, or other devices. As the user moves, the digital yarn unspools, recording the user’s movement. A visual trail is created and displayed as an …


Multi-Sensor Scheduling And Preconditioning For Remote Temperature Control, Eric Burger, Ernie Yang, Ben Mccanny Sep 2024

Multi-Sensor Scheduling And Preconditioning For Remote Temperature Control, Eric Burger, Ernie Yang, Ben Mccanny

Defensive Publications Series

Smart home devices can support multi-sensor scheduling, monitoring, and adjusting of home heating, ventilation, and air-conditioning (HVAC) based on a schedule set by a user. Schedule-based temperature presets across changing groups of sensors can experience problems arising from stale/offline sensors, preconditioning, and an excessive memory footprint of the schedule. This disclosure describes techniques of multi-sensor, multi-room remote temperature control that can process user-set temperature schedules across changing groups of sensors while gracefully handling stale/offline sensors and preconditioning constraints. The techniques have a low memory footprint. Readings from sensors are weighted based on recency, such that stale/offline sensors are gracefully removed …


Text Steganography Using Large Language Model, N/A Sep 2024

Text Steganography Using Large Language Model, N/A

Defensive Publications Series

While encryption can ensure secure message exchange, the use of encryption can draw attention to the communication because encrypted content is not human readable. While text steganography can embed hidden messages in human-readable text, it is vulnerable to disclosure to unintended recipients. This disclosure describes steganography techniques that leverage machine learning techniques, specifically generative pre-trained transformer (GPT) type large language model (LLM) to generate human-readable natural language text that seamlessly conceals a different message within the text. The use of GPT can enhance the fluency and coherence of the natural language text, thus making it difficult to detect the secret …


A Point-Of-Sale Digital Payment Device For Extending Credit, Ajay Prasad, Gajen Agrawal Sep 2024

A Point-Of-Sale Digital Payment Device For Extending Credit, Ajay Prasad, Gajen Agrawal

Defensive Publications Series

In the absence of credit scores, credit penetration remains low in many regions of the world. This limits economic opportunities for a large portion of the global population that lack credit histories. For many users, traditional sources of credit such as banks or microfinance institutions are difficult to access and cumbersome and are not tailored to their financial needs. This disclosure describes a compact, internet-connected payment device that can be deployed at small and medium-sized business (SMB) outlets. The device serves both as a digital payment terminal as well as an access point for credit discovery and lending. With appropriate …


Traffic Signal Wait Time Estimation Using Machine Learning, Ajay Prasad Sep 2024

Traffic Signal Wait Time Estimation Using Machine Learning, Ajay Prasad

Defensive Publications Series

Urban areas include a large number of traffic intersections and signals. Wait times at traffic signals can be long at times and can lead to user frustration. While digital map applications can provide predictions of overall time of travel for a journey and can also indicate congested parts of the route, these cannot reduce the frustration of waiting at a traffic signal. This disclosure describes the use of machine learning prediction models to automatically generate real-time predictions of wait times at intersections along a route. The predictions are based on historical data as well as on current traffic patterns, weather …


Generating Photorealistic Images Of Physical Products Placed Within A Target Space, Siva Kumar Gorantla, Brendan Driscoll, Ishaan Malhi, Garima Pruthi, Krista Holden, Praneet Dutta, Arunachalam Narayanaswamy Sep 2024

Generating Photorealistic Images Of Physical Products Placed Within A Target Space, Siva Kumar Gorantla, Brendan Driscoll, Ishaan Malhi, Garima Pruthi, Krista Holden, Praneet Dutta, Arunachalam Narayanaswamy

Defensive Publications Series

In many use cases, it is useful to visualize a product within a target environment. This disclosure describes techniques to train and employ image generation artificial intelligence models to generate photorealistic images of one or more products placed within a target physical environment. The user can interact with the generated image to obtain additional views with different placement and/or orientation of the product in different rooms/ room types. The generated images provide the user with a high-quality visualization that enables them to evaluate the fit and aesthetics of the product within the target physical environment. The models are trained to …


Geometric And Perspective Distortion Correction For Videoconferencing Systems, Hp Inc Sep 2024

Geometric And Perspective Distortion Correction For Videoconferencing Systems, Hp Inc

Defensive Publications Series

Wide angle lenses are used in videoconferencing systems for meeting rooms to fit everybody in the picture. But this type of lens cannot mimic human vision since they have geometric and perspective distortion. We propose a method to correct both types of distortion.


Process For The Preparation Of Amorphous Form Of Trisodium Sacubitril Valsartan, Anonymous Sep 2024

Process For The Preparation Of Amorphous Form Of Trisodium Sacubitril Valsartan, Anonymous

Defensive Publications Series

The present publication relates to process for preparation of amorphous form of Trisodium Sacubitril Valsartan of Formula I.


Progressive Audience Reduction For User-Generated Content, Marek Matejka Sep 2024

Progressive Audience Reduction For User-Generated Content, Marek Matejka

Defensive Publications Series

As disclosed herein, a computer-implemented method for progressive audience reduction is provided. The computer-implemented method may include receiving, via a user interface associated with a social media platform, a selection of a group of users to provide with an access to a content associated with a first user of the group of users. The computer-implemented method may include activating an access reduction for the content. The computer-implemented method may include updating, based on the instruction, a metadata of the content. The computer implemented method may include providing, based on the metadata, the access to the content to the group of …


Foil Take-Up Detection In Smt Feeder Modules Sep 2024

Foil Take-Up Detection In Smt Feeder Modules

Defensive Publications Series

A foil catching mechanism that incorporates a detection part connected to a movable stuffing wheel and a movable peeling wheel such that movements of the stuffing wheel and peeling wheel can each be detected by the detection part. In this way, it is possible to detect the foil being caught at both the peeling wheel and the stuffing wheel, indicating successful take-up. Consequently, the system can automatically respond to any catching failures and retry the operation. This set-up allows both detections (foil in peeling wheel and foil in stuffing wheels) to be achieved by a single detector within a very …


Fast Llm Inference By Early Autoregression Abort Based On Query Complexity, D Shin Sep 2024

Fast Llm Inference By Early Autoregression Abort Based On Query Complexity, D Shin

Defensive Publications Series

Deep transformer decoder architectures utilized in large language models (LLMs) perform a series of non-linear operations on input tokens to predict the most likely next tokens. Executing a fixed number of decoder operations to compute the output tokens means that all queries have the same or similar computational cost. This disclosure describes a language model framework that performs autoregressive output at several intermediate layers, with training including a net loss for token completion at all inference layers to allow for early abort for simple queries. An arbiter network is provided that analyzes the input query and outputs a one-hot vector …


Thermal Pads With Curved Surface For Improved Thermal Efficiency, N/A Sep 2024

Thermal Pads With Curved Surface For Improved Thermal Efficiency, N/A

Defensive Publications Series

This disclosure describes a thermal pad that provides high thermal efficiency when affixed to a heat source in electronic components. The thermal pad is pre-shaped into a dome (spherically or contoured) shape that is thicker at the center and thinner at the perimeter. The thermal pad includes a curved (dome shaped) surface. When clamping forces are applied during assembly, a surface of the thermal pad comes into contact with a surface of the heat source, first at the center of the contact area, and then over a progressively greater surface area. The gradual coverage of the surface area, starting at …


Instrumented Payloads For Industrial Mobile Robots And Conveyor Systems, N/A Sep 2024

Instrumented Payloads For Industrial Mobile Robots And Conveyor Systems, N/A

Defensive Publications Series

Industrial mobile robots (IMR) can potentially collect useful data about their operating environments. However, integrating environmental sensors into IMRs can be costly and labor intensive. This disclosure describes a container instrumented with sensor telemetry that can be transported aboard IMR or conveyor systems already in use by operators. The IMR or conveyor systems provide transportation to the instrumented payload and enable operators to collect environmental data while the instrumented payload is in transit. As environmental data within a warehouse is usually collected at periodic intervals, it is economical for robots to pick up an instrumented payload to run a telemetry …


Compact Dual-Sided Thermal Solution Retention For High Component Density, N/A Sep 2024

Compact Dual-Sided Thermal Solution Retention For High Component Density, N/A

Defensive Publications Series

In small form factor devices, mounting for fastening thermal solutions are constrained. This is particularly challenging when surface-mount technology (SMT) components require cooling on both the primary and secondary sides of a two-sided printed circuit board (PCB) assembly. This disclosure describes techniques to optimize the physical stability of thermal solutions by balancing the load across different surface-mount technology (SMT) components that require cooling. Per the techniques, a sliding, spring-loaded captive screw is attached to the primary thermal solution by way of through-travel of a threaded section that is precisely controlled for thread pitch and length such that it can rotate …


Continuously Adjustable Thermal Solution Load Cell, N/A Sep 2024

Continuously Adjustable Thermal Solution Load Cell, N/A

Defensive Publications Series

Mechanical screw-actuated assemblies, referred to as load cells, are used to apply force to a thermal interface material (TIM) layer between an application-specific integrated circuit (ASIC) and a thermal solution, such as a heatsink. The force applied by the load cells is crucial for the performance of the thermal interface and the optimal levels of force loading are unknown at the start of a design process. This disclosure describes techniques that enable the tuning of thermal solution retention forces to optimal levels. The uncertainty in loading force is addressed by including a continuously adjustable spool nut within the load cell …


Electro-Mechanical Safety Mechanism For Additive Manufacturing Machines, N/A Sep 2024

Electro-Mechanical Safety Mechanism For Additive Manufacturing Machines, N/A

Defensive Publications Series

This disclosure describes a safety mechanism to automatically deactivate heating elements of a 3D printer in response to detecting thermal runaway conditions. A physical switch is provided in the path of the mechanical axis of movement of a moving part of the 3D printer, such as an extruder. The physical switch is positioned such that it is not activated (pressed) during the normal operation of the 3D printer, but is activated (e.g., physically pressed) by movement of the motors beyond their normal range of motion. If it is determined that a potentially unsafe condition has occurred, such as the temperature …


Gesture-Driven Attribute Transfer For Visual Assets Using Generative Artificial Intelligence, Manasa Babu Sep 2024

Gesture-Driven Attribute Transfer For Visual Assets Using Generative Artificial Intelligence, Manasa Babu

Defensive Publications Series

This disclosure describes techniques that use generative artificial intelligence (gen-AI) to enable the rapid merging of visual assets using drag/pinch gestures to create an output visual that draws on individual attributes of the constituent visual assets. The techniques, effectively a design paradigm, enable non-technical users with little or no design skills to combine a reference visual (asset) with an original asset to create a new, merged asset. The techniques can accelerate productivity, reduce design time, increase design possibilities, increase decision-making speed, and democratize the design and management of visual assets. Example use cases include user interface design, photo editing, icon …


Automated Identification Of Related Content And Placement Of Links Within A Video, D Shin Sep 2024

Automated Identification Of Related Content And Placement Of Links Within A Video, D Shin

Defensive Publications Series

To enhance viewer engagement, video creators embed links of related content within their videos. Integrating links to related videos is a manual procedure that requires creators to review videos to identify appropriate frames to embed related content and determine appropriate content to be embedded. This disclosure describes techniques that leverage a visual language model (VLM) to automate the spatiotemporal placement of links to related (recommended) content within a video. Subframes of the target video and of potential anchor videos are transformed to embeddings in a shared metric space via a VLM. Candidate anchor videos to link to and spatiotemporal locations …


Enhanced Underwater Communication System, Meghana Vakkalanka, Shivani Shivaprasad Naik, Vinuta Chandrakanta Patankar, Likitha R, Priyanka Bansal Sep 2024

Enhanced Underwater Communication System, Meghana Vakkalanka, Shivani Shivaprasad Naik, Vinuta Chandrakanta Patankar, Likitha R, Priyanka Bansal

Defensive Publications Series

Techniques described herein provide for an Intelligent Distributed Model Predictive Control System for Adaptive Underwater Acoustic Communication that integrates distributed model predictive control (DMPC) with machine learning (ML) to dynamically adjust transmission parameters, thereby improving signal reliability and adapting to the underwater environment. By leveraging a distributed architecture, the techniques intelligently manage signal transmission among underwater sensors or clusters of underwater sensors. The subsystems of the system work in unison to predict, optimize, and coordinate communication parameters using advanced ML computations.


Improved Process For The Purification Of Abemaciclib, Anonymous Sep 2024

Improved Process For The Purification Of Abemaciclib, Anonymous

Defensive Publications Series

The present publication relates to process for the purification of Abemaciclib, chemically known as N-[5-[(4-ethyl-l-piperazinyl) methyl]-2-pyridinyl]-5-fluoro-4-[4-fluoro-2-methyl-1-(1- methylethyl)-1H-benzimidazol-6-yl]-2-pyrimidinamineof Formula-1.


Dynamic Notebook Camera Resolution And Audio Processing Based On Level Of User Participation During Conferencing For System Optimization, Hp Inc Sep 2024

Dynamic Notebook Camera Resolution And Audio Processing Based On Level Of User Participation During Conferencing For System Optimization, Hp Inc

Defensive Publications Series

Notebook camera modules can support varying levels of resolution, which is measured in megapixels (MP). Typically, the higher the camera resolution, the more video processing power that will be required. Currently, the Image Singal Processor (ISP), through which raw images from the camera are fed through, automatically processes images at the highest resolution available, however, it can be configured to process images at a lower resolution.

Similarly, an audio processing unit can perform various features such as background noise cancellation or suppression. These features can be helpful to improve the audio quality and clarity, but they also require constant processing …


Llm-Based Fulfilment Approach Utilizing A Partial Rag Retrieval Process, Anupam Mukherjee Sep 2024

Llm-Based Fulfilment Approach Utilizing A Partial Rag Retrieval Process, Anupam Mukherjee

Defensive Publications Series

Large Language Model-based (LLM-based) fulfilment, while powerful, presents several issues or limitations. These include scalability and performance challenges for handling a large set of functions, contextual and function ambiguity, maintenance complexity, debugging difficulties, and security risks due to role-based access control (RBAC) restrictions. Current approaches have not adequately addressed these limitations. However, an innovative approach is proposed herein to effectively tackles these issues, offering a more robust solution by employing a function vector database (DB) alongside a Retrieval Augmented Generation (RAG) retrieval mechanism that can be used to determine the most suitable function to be called, outside of an LLM. …


Configurable Activation And Deactivation Of Artificial Intelligence Capabilities In Network Devices, Sabyasachi Sensarma, Srikanth M. K, Bhaskar Srinivasan, Hariprasad Kudige Shenai, Ganesh Sankarapandiyan Sep 2024

Configurable Activation And Deactivation Of Artificial Intelligence Capabilities In Network Devices, Sabyasachi Sensarma, Srikanth M. K, Bhaskar Srinivasan, Hariprasad Kudige Shenai, Ganesh Sankarapandiyan

Defensive Publications Series

There has been recent development in artificial intelligence (AI) features being enabled in network switches and devices. Some users might not be comfortable enabling AI on all of their networks. To overcome this issue, proposed herein is a technique to activate/deactivate AI/GenAI features using a button on a switch/network and a LED to indicate the status of the AI features.


Usb Device Theft Detection, Hp Inc Sep 2024

Usb Device Theft Detection, Hp Inc

Defensive Publications Series

As hot desking environments become more common, peripherals are getting taken off desks more than ever. Peripheral theft is at an all time high. People will use a hot desk and take one or more of the USB devices with them after their session. In other cases, people passing by the hot desk will need a specific device and take it without authorization. Currently there is no automated way to discover that peripheral devices are missing. Instead we must rely on the users to report the missing devices or have IT walk around and inventory every peripheral in a desk …


Method Of Capture Card Integration Via Display Connection To Pc/Console, Hp Inc Sep 2024

Method Of Capture Card Integration Via Display Connection To Pc/Console, Hp Inc

Defensive Publications Series

Today for gamers to capture gameplay footage and then stream it to a video capturing app they have two main methods to accomplish this goal. The first involves a PCIE capture card on their desktop PC that receives inputs directly. The second involves a dongle/adapter type solution that intercepts an HDMI signal from a console and converts it to USB for a notebook to read. These methods require users to purchase and use additional hardware with their devices in order to capture gameplay footage in real time. The proposed method would allow the display/monitor to handle the capture card processing …


Improved Power Management In Multi-Chassis Systems During Faults, Saurabh Sharma, Patrice Chow, Leila Reyhani, Patrice Brissette Sep 2024

Improved Power Management In Multi-Chassis Systems During Faults, Saurabh Sharma, Patrice Chow, Leila Reyhani, Patrice Brissette

Defensive Publications Series

A network device in ideal state stays powered-on and a backup, standby instance, also remains powered on, in case the primary network device fails. In a network failover event, when the primary network switches to a standby device, the failed side normally remains powered-on, despite serving no purpose. This presents an opportunity for power savings. For example, by powering down a failed chassis and/or its components, the carbon footprint of such devices can be curtailed. Proposed herein is a process to decrease/avoid power consumption by a failed device or chassis, during certain network failure conditions, which can enable networks to …