Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 30 of 995
Full-Text Articles in Entire DC Network
Smart Dispensers To Optimize Restocking Process, Kenneth M. Schow
Smart Dispensers To Optimize Restocking Process, Kenneth M. Schow
Defensive Publications Series
Many businesses need to efficiently restock paper towels in company bathroom facilities. This disclosure describes a smart paper towel dispenser which includes a built-in scale to detect the weight of the paper towel roll and a WiFi/GPS enabled microcontroller. The rate at which paper towels are dispensed and the device location is obtained to assess the number of towels remaining, the number of towels dispensed, and to determine when the paper towel stock is low and needs to be replaced. An alert is provided to the responsible personnel to replace the paper towels. The data can also be used to …
Motion Activated Wireless Reconnection, Jonathan D. Hurwitz
Motion Activated Wireless Reconnection, Jonathan D. Hurwitz
Defensive Publications Series
The time taken from the removal of a laptop or other device from a bag by a user to the establishment of connection to a wireless network can be significant, e.g., ten seconds or more. This disclosure describes techniques to reduce this delay to nearly zero. Per the techniques, upon detection of motion by on-board motion sensors of a device, the device wakes from a sleep state and automatically scans for and connects to a WiFi network.
Bridge Devices For Wireless Projection Of Vehicle Operating Systems, Sriram Viswanathan, Eugene Koh, Haris Ramic, Mickey Kataria, Zhen Yu Song
Bridge Devices For Wireless Projection Of Vehicle Operating Systems, Sriram Viswanathan, Eugene Koh, Haris Ramic, Mickey Kataria, Zhen Yu Song
Defensive Publications Series
Vehicles may provide an infotainment experience that is hosted by a head unit or other computing device. The head unit may execute a native operating system that provides an execution environment in which an operating system client may execute to support execution of a different operating system hosted by another computing device (e.g., a smartphone, laptop computer, tablet computer, etc.). The head unit may require that the computing device physically interconnect with the head unit as the head unit may not support wireless connections (or only support limited wireless connections in the form of bandwidth limited connection – e.g., personal …
Modeling Statistically Significant Propensity Controls, Brian Mulford, Yueheng Du, Colby Ranger
Modeling Statistically Significant Propensity Controls, Brian Mulford, Yueheng Du, Colby Ranger
Defensive Publications Series
A mechanism for modeling statistically significant propensity controls in survey lift studies is disclosed. The proposed mechanism establishes a statistically significant control model for organic viewers in order to measure attitudinal shifts and lift from the viewing population. On a high level, audience overlap is measured to find channels that are similar to the channels in an organic video campaign. Active subscribers of the identified similar channels are then used as the non-exposed group, after filtering out those who watched the organic videos. The resulting channels that share viewer audiences are filtered by channel topicality (e.g., electronics reviews, beauty tips, …
System For Automotive Data Management, Carsten Isert, Tobias Haamel, Ram Bulantnikov, John Patterson
System For Automotive Data Management, Carsten Isert, Tobias Haamel, Ram Bulantnikov, John Patterson
Defensive Publications Series
Vehicles may include computing devices, referred to as head units, capable of communicating with mobile computing devices carried by users. A mobile computing device may store or otherwise have access to data. For instance, a mobile computing device may store an address. While it may be desirable for a head unit to have access to data, it may be inconvenient for the user to provide data to the head unit or the user may be reluctant to provide data to the head unit. In accordance with the techniques of this disclosure, a mobile computing device may share at least a …
Intelligent Sim Switching In A Multi-Sim Computing Device, Shivank Nayak, Sooraj Sasindran, Jayachandran Chinnakkannu
Intelligent Sim Switching In A Multi-Sim Computing Device, Shivank Nayak, Sooraj Sasindran, Jayachandran Chinnakkannu
Defensive Publications Series
A system is described that enables a computing device (e.g., a mobile phone, a tablet computer, a laptop computer, etc.) to intelligently determine whether to move a data connection from a default data subscriber identity module (DDS) to a non-default data subscriber identity module (non-DDS) when initiating a voice call or during an on-going voice call on the non-DDS in a multiple subscriber identity module (multi-SIM) computing device based on a current state of the computing device. The current state of the computing device may be determined based on various contextual signals, including data usage for each application on the …
Peeking User Interface For Foldable Devices, Yameng Lee Thorp, Hideaki Matsui
Peeking User Interface For Foldable Devices, Yameng Lee Thorp, Hideaki Matsui
Defensive Publications Series
This disclosure describes techniques to utilize an exposed portion of the display screen of a foldable device in a folded state to display a peeking user interface. Per techniques of this disclosure, a user interface displays selected content on the exposed portion of a display screen when a device is in the folded state. The selected content can include important notifications such as incoming calls, received text messages, contextual information, items that need user attention, etc. The exposed portion of the display screen in the folded state can be utilized to display icons associated with applications that are of likely …
Heightened Security Measures For Marked Applications, Rachel Hausmann, Collin Irwin
Heightened Security Measures For Marked Applications, Rachel Hausmann, Collin Irwin
Defensive Publications Series
A system is described that enables a computing device (e.g., a mobile phone, a camera, a tablet computer, etc.) to associate an application with a security level (e.g., a high-sensitive level, a middle-sensitive level, a low-sensitive level, etc.), and provide additional security mechanisms (e.g., auto-lock, biometric authentication, password authentication, etc.) to the application based on the security level. A user may set a security level for an application, and the computing device may provide additional security mechanisms to the application based on the selected security level. For example, a user may associate a banking application with a high-sensitive security level, …
Inserting Multimedia Content Captured By One Device Into A Document On Another Device, Thomas Deselaers, Victor Carbune
Inserting Multimedia Content Captured By One Device Into A Document On Another Device, Thomas Deselaers, Victor Carbune
Defensive Publications Series
Many applications include capabilities that allow users to capture and insert multimedia content into a document by capturing it with the device camera. However, document creation and editing tasks are often performed on traditional desktop or laptop computers on which the camera is typically positioned in a fixed location above the screen. Capturing multimedia content that includes matter other than that located directly in front of the computer screen is awkward and often infeasible. On the other hand, integrating multimedia content captured by another device into a document being edited on the separate device requires a cumbersome and inefficient multi-step …
Suggesting Titles For Audio Recordings, Itay Inbar, Amit Pitaru, Isaac Blankensmith, Dror Ayalon, Tiago Camolesi, Guilherme Santos, James Lemieux, Sherry Lin, Jason Cho
Suggesting Titles For Audio Recordings, Itay Inbar, Amit Pitaru, Isaac Blankensmith, Dror Ayalon, Tiago Camolesi, Guilherme Santos, James Lemieux, Sherry Lin, Jason Cho
Defensive Publications Series
Techniques of this disclosure may enable a computing device to suggest one or more titles based on the content of audio being recorded or audio that was previously recorded, and other data such as time and location. Rather than applying a general default title or audio file name, the computing device may request authorization from a user to analyze the contents of a recorded audio file and, after receiving explicit authorization from the user, analyze the audio, including speech, and automatically suggest titles that are indicative of the content of the audio and/or other data. The computing device may convert …
Efficient Wireless Network Scans For Computing Devices, Kai Shi, Kumar Anand
Efficient Wireless Network Scans For Computing Devices, Kai Shi, Kumar Anand
Defensive Publications Series
Computing devices increasingly provide wireless network connections rather than wired network connections. In order to support the wireless network connections, the computing devices scan for wireless access points (WAPs) in a number of different ways that may avoid needless consumption of power. For example, the computing devices may support periodic preferred network offload (PNO) scans that enable low-power wireless network scans for so-called “preferred networks” while the primary processor is in a low power (or, in other words, stand-by state). The computing devices may also separately enable roaming scans for switching between WAPs associated with the same wireless network (e.g., …
Gesture Based Activation Of Private Mode, Nabil Shahid
Gesture Based Activation Of Private Mode, Nabil Shahid
Defensive Publications Series
Applications executing at a computing device may operate in a variety of modes, including a regular mode and a private mode. When operating in the private mode, the application may refrain from storing activity information. For instance, when operating in the private mode, a web browser application may refrain from storing browsing history, cookies and site data, and/or information entered in forms. Similarly, when operating in the regular mode, the web browser application may store, after receiving user authorization, browsing history, cookies and site data, and/or information entered in forms. A user may cause an application to operate in the …
A Method To Provide Print Control Over Heterogeneous 3d Print Buckets, Hp Inc
A Method To Provide Print Control Over Heterogeneous 3d Print Buckets, Hp Inc
Defensive Publications Series
How could a company make sure that their intellectual property is being used correctly and according to the
agreements set with Print-Service-Providers (PSP) So far the copyright laws did not catch up to this new 3D print
world and one of the challenges is to enable Content Providers to track the agreements set with PSPs, and allowing
management of thousands of different PSPs printing a variety of models per bucket (3D bed filled with objects to be
printed). Some of these models can have copyright and some not, creating a heterogeneous print bucket. The models
in the bucket may have …
Semi-Auto Reel To Reel Install Of New Web Wipe For 3d Printer And Wide Format Printers, Hp Inc
Semi-Auto Reel To Reel Install Of New Web Wipe For 3d Printer And Wide Format Printers, Hp Inc
Defensive Publications Series
To handle the high volume of prints typical to 3D Printing or large format printing, Web
Wipes are at a high frequency installed manually by heavily trained operators. Installing
a Web Wipe is a challenging task that involves the user reaching into the machine from
the front and the top simultaneously. This is very cumbersome and time-consuming,
especially for smaller individuals, and can be very messy getting agent/ink on the user
and the machine. In a production environment the downtime of this task contributes
significantly to the overall operating expense of the equipment.
Identify Print Quality Or Sub-System Degradation Issues For 3d Printers Using Layer Time Analysis, Hp Inc
Identify Print Quality Or Sub-System Degradation Issues For 3d Printers Using Layer Time Analysis, Hp Inc
Defensive Publications Series
One of the core concepts in additive manufacturing is to have accurate powder deposition on bed
with uniform duration throughout the print job. The inaccuracy in job layer duration arising when
some layers take more or lesser than the recommended value, often results in bad part quality issue
or indicate issues with print hardware components.
This disclosure describes a method for improving Print Quality (PQ) and reduce unplanned
downtime (due to sub-system failure) by looking at layer time for the print cycles and figuring if
they are running off the prescribed limits for the material used. Based on this information …
Constant Pressure Valve To Compensate Extraction System Pressure Variations, Hp Inc
Constant Pressure Valve To Compensate Extraction System Pressure Variations, Hp Inc
Defensive Publications Series
Some 3D Printing technology heavily depends on the internal printing conditions in the
Printing Chamber. One of the most important variables are temperature and pressure.
The first permits to have temperature in a narrow range in order to have powder surface
at constant conditions for printing process. Pressure and pressure distribution inside the
chamber permits defined airflows within this cabinet.
Energy sources may include Fusing Lamps and Top Lamps. As the powder itself has a
particular reflectance, not all the energy is absorbed, but reflected inside the printing
chamber. Additionally, there are other heat sources in order to keep the …
Automatic Arch Recovery For 3d Powder Loading Systems, Hp Inc
Automatic Arch Recovery For 3d Powder Loading Systems, Hp Inc
Defensive Publications Series
Disclosure to explain an automated system which detects powder low flowability and executes an arch
recovery increasing the powder flow and allowing successful powder loading for 3D systems.
Powder flowability is affected by multiple factors (powder type, recycled powder condition, humidity,
temperature) which alters the loading time and successful loading finish rate. In some cases, and specially
with some powder types such as PA11, it has been observed that the powder gets stuck to the walls of its
container decreasing the flow and increasing the loading times.
To avoid this effect, an arch recovery can be executed once the powder …
A Job Tree Structure To Track Auto Generated Build Envelope Status And Consumption, Hp Inc
A Job Tree Structure To Track Auto Generated Build Envelope Status And Consumption, Hp Inc
Defensive Publications Series
When a 3D printer user wants to print a job and do an external cooling, he needs to indicate this prior
to sending the job to the printer, so the system can behave accordingly to ensure the best part quality
possible. One of the actions of the system consists in generating a build envelope to physically protect
the build content when it is transferred to the external cooling unit. The user always wants to have some
information about all the printed parts, including the autogenerated ones. Thus, we need to provide a
mechanism to be able to track what happens …
Improving 3d Printed Part Quality Using Artifical Neural Networks Of The Generative Adversarial Type, Hp Inc
Improving 3d Printed Part Quality Using Artifical Neural Networks Of The Generative Adversarial Type, Hp Inc
Defensive Publications Series
The challenges for digital manufacturing today are vast. Challenges like reproducibility and
mechanical properties preservation are crucial. Currently, 3D printed parts are affected by each
build setup. The thermal diffusion occurring in the process affects the final product once it has
cooled down.
Dynamic System To Raise The Build Unit Platform During Uncaking, Hp Inc
Dynamic System To Raise The Build Unit Platform During Uncaking, Hp Inc
Defensive Publications Series
Disclosure to explain a new system that automatically raise the build unit platform during the uncake
operation in a powder Processing Station.
The current system requires the operator to push an up or down button to move the platform during the
uncake when the recycled powder is being vacuum. When the operator pushes the up button, the
platform is being raised to the top position in order to continue the process.
With the system proposed here, during an unpack operation, a laser sensor reads the distance, so it can
calculate when the powder has been removed and the platform could …
Automatic Generation Of 3d Camouflage And Other Patterns, Hp Inc
Automatic Generation Of 3d Camouflage And Other Patterns, Hp Inc
Defensive Publications Series
This disclosure relates to the field of 3D printing. We use the colors, patterns, and textures of a terrain
to generate 3D surfaces and objects that are camouflaged in that environment. We can automatically
scan the visual information using cameras, depth cameras, and other visual sensors, or we can work
from photos, videos, or even descriptions. We then generate a 3D model of a surface from this visual
information. This means that a 3D printer deployed in a region can generate on‐the‐fly objects
camouflaged for that region.
External Heating Device To Facilitate Unpacking Process In Powder Processing Station, Hp Inc
External Heating Device To Facilitate Unpacking Process In Powder Processing Station, Hp Inc
Defensive Publications Series
This disclosure relates to the field of 3D Printing with Thermoplastic Polyurethane (TPU) material. The
process to print parts using this material has very strict timing constraints.
An accessory is disclosed that provides the user more flexibility by preventing the loss of temperature
during the unpack process, leading to enhanced part quality. The system described can be assembled on
the processing station and used during the unpack of TPU parts.
Fast Cleaning Roll Snapping Installation System Solution For 3d And Large Format Printers, Hp Inc
Fast Cleaning Roll Snapping Installation System Solution For 3d And Large Format Printers, Hp Inc
Defensive Publications Series
Cleaning roll is a high frequency replacement supply used in the 3D and Large Format
printers used for doing an automatic servicing of the Print heads of the system. The
replacement workflow is a challenging and time-consuming task that involves the user
reaching into the machine from the front and top simultaneously with a limited space
available.
In a production environment the downtime of the tasks contributes significantly to the
overall operating expense of the equipment.
Providing Content Items Based On Determination That A Chat Conversation Relates To A Business Transaction, Anonymous
Defensive Publications Series
An online messaging application receives content that describes a conversation conducted via the online messaging application between a user and a business entity having a presence on the online messaging application. Features are extracted from the content and a transaction prediction model is applied to predict a likelihood that the conversation describes a transaction between the user and the business entity. Based on the predicted likelihood that a transaction has occurred, content items are identified for presentation to the user.
Return-Oriented Programming Detection And Prevention Utilizing A Hardware And Software Adaptation, Alex Levin
Return-Oriented Programming Detection And Prevention Utilizing A Hardware And Software Adaptation, Alex Levin
Defensive Publications Series
This publication describes techniques aimed at detecting and preventing return-oriented programming (ROP) attacks. The techniques consist of a software adaptation which enables supplemental hardware, specifically a system on a chip (SoC), to chronologically log return (ret) addresses of pushed stack frames and compare those logged ret addresses to ret commands executed by a central processing unit (CPU) of a computing system. When the SoC determines that ret commands executed by the CPU have deviated from the logged ret addresses, then the SoC can take action to thwart a ROP attack.
Dot Product Matrix Compression For Machine Learning, Anonymous
Dot Product Matrix Compression For Machine Learning, Anonymous
Defensive Publications Series
When pairwise dot products are computed between input embedding vectors and the dot product is used for further computation, the number of dot products grows quadratically with the number of embedding vectors. This can cause an efficiency bottleneck and affect performance of machine learning models. This disclosure describes techniques to obtain a compressed dot product matrix from input sparse embeddings. The compressed embeddings are used to obtain a compressed dot product. The compressed embeddings are generated using a weights matrix that is initialized randomly and learnt alongside other parts of the model. To improve performance, attention weights derived from the …
A Soultion With Stealth Fastener For Cosmetic Enhancement, Hp Inc
A Soultion With Stealth Fastener For Cosmetic Enhancement, Hp Inc
Defensive Publications Series
Prior solutions most of parts fastened by screw
Improved Message Facilitator For On-Time And Quick Response, Amy Zhang, Cliff Sze
Improved Message Facilitator For On-Time And Quick Response, Amy Zhang, Cliff Sze
Defensive Publications Series
Increasing reliance on written electronic communication has created a need for automated ways for users to efficiently manage and respond to the various emails, texts, and other electronic messages that they receive. Some solutions have already been introduced to help remind users respond to messages after some number of days have passed, and to help users compose messages. However, through the use of natural language processing, these features can be improved so that users are kept aware of pending response deadlines, and presented with proposed responses that take account of the context of a given message, as well as any …
Camera Test Station And Pallet Design For Measuring 3d Print Powder, Hp Inc
Camera Test Station And Pallet Design For Measuring 3d Print Powder, Hp Inc
Defensive Publications Series
A text fixture for 3D print powder receives a pallet with multiple powder wells
for assessment of whether the various powders are suitable for recycling for use in
producing high quality 3D-printed parts.
Preheated Air Inlets For Additive Manufacturing, Hp Inc
Preheated Air Inlets For Additive Manufacturing, Hp Inc
Defensive Publications Series
Cooling air in an additive manufacturing system is supplied at a set
temperature higher than the operating temperature range of the system in order to ensure
proper cooling of parts fabricated in the print bed.