Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

2019

Defensive Publications Series

Articles 1 - 30 of 995

Full-Text Articles in Entire DC Network

Smart Dispensers To Optimize Restocking Process, Kenneth M. Schow Dec 2019

Smart Dispensers To Optimize Restocking Process, Kenneth M. Schow

Defensive Publications Series

Many businesses need to efficiently restock paper towels in company bathroom facilities. This disclosure describes a smart paper towel dispenser which includes a built-in scale to detect the weight of the paper towel roll and a WiFi/GPS enabled microcontroller. The rate at which paper towels are dispensed and the device location is obtained to assess the number of towels remaining, the number of towels dispensed, and to determine when the paper towel stock is low and needs to be replaced. An alert is provided to the responsible personnel to replace the paper towels. The data can also be used to …


Motion Activated Wireless Reconnection, Jonathan D. Hurwitz Dec 2019

Motion Activated Wireless Reconnection, Jonathan D. Hurwitz

Defensive Publications Series

The time taken from the removal of a laptop or other device from a bag by a user to the establishment of connection to a wireless network can be significant, e.g., ten seconds or more. This disclosure describes techniques to reduce this delay to nearly zero. Per the techniques, upon detection of motion by on-board motion sensors of a device, the device wakes from a sleep state and automatically scans for and connects to a WiFi network.


Bridge Devices For Wireless Projection Of Vehicle Operating Systems, Sriram Viswanathan, Eugene Koh, Haris Ramic, Mickey Kataria, Zhen Yu Song Dec 2019

Bridge Devices For Wireless Projection Of Vehicle Operating Systems, Sriram Viswanathan, Eugene Koh, Haris Ramic, Mickey Kataria, Zhen Yu Song

Defensive Publications Series

Vehicles may provide an infotainment experience that is hosted by a head unit or other computing device. The head unit may execute a native operating system that provides an execution environment in which an operating system client may execute to support execution of a different operating system hosted by another computing device (e.g., a smartphone, laptop computer, tablet computer, etc.). The head unit may require that the computing device physically interconnect with the head unit as the head unit may not support wireless connections (or only support limited wireless connections in the form of bandwidth limited connection – e.g., personal …


Modeling Statistically Significant Propensity Controls, Brian Mulford, Yueheng Du, Colby Ranger Dec 2019

Modeling Statistically Significant Propensity Controls, Brian Mulford, Yueheng Du, Colby Ranger

Defensive Publications Series

A mechanism for modeling statistically significant propensity controls in survey lift studies is disclosed. The proposed mechanism establishes a statistically significant control model for organic viewers in order to measure attitudinal shifts and lift from the viewing population. On a high level, audience overlap is measured to find channels that are similar to the channels in an organic video campaign. Active subscribers of the identified similar channels are then used as the non-exposed group, after filtering out those who watched the organic videos. The resulting channels that share viewer audiences are filtered by channel topicality (e.g., electronics reviews, beauty tips, …


System For Automotive Data Management, Carsten Isert, Tobias Haamel, Ram Bulantnikov, John Patterson Dec 2019

System For Automotive Data Management, Carsten Isert, Tobias Haamel, Ram Bulantnikov, John Patterson

Defensive Publications Series

Vehicles may include computing devices, referred to as head units, capable of communicating with mobile computing devices carried by users. A mobile computing device may store or otherwise have access to data. For instance, a mobile computing device may store an address. While it may be desirable for a head unit to have access to data, it may be inconvenient for the user to provide data to the head unit or the user may be reluctant to provide data to the head unit. In accordance with the techniques of this disclosure, a mobile computing device may share at least a …


Intelligent Sim Switching In A Multi-Sim Computing Device, Shivank Nayak, Sooraj Sasindran, Jayachandran Chinnakkannu Dec 2019

Intelligent Sim Switching In A Multi-Sim Computing Device, Shivank Nayak, Sooraj Sasindran, Jayachandran Chinnakkannu

Defensive Publications Series

A system is described that enables a computing device (e.g., a mobile phone, a tablet computer, a laptop computer, etc.) to intelligently determine whether to move a data connection from a default data subscriber identity module (DDS) to a non-default data subscriber identity module (non-DDS) when initiating a voice call or during an on-going voice call on the non-DDS in a multiple subscriber identity module (multi-SIM) computing device based on a current state of the computing device. The current state of the computing device may be determined based on various contextual signals, including data usage for each application on the …


Peeking User Interface For Foldable Devices, Yameng Lee Thorp, Hideaki Matsui Dec 2019

Peeking User Interface For Foldable Devices, Yameng Lee Thorp, Hideaki Matsui

Defensive Publications Series

This disclosure describes techniques to utilize an exposed portion of the display screen of a foldable device in a folded state to display a peeking user interface. Per techniques of this disclosure, a user interface displays selected content on the exposed portion of a display screen when a device is in the folded state. The selected content can include important notifications such as incoming calls, received text messages, contextual information, items that need user attention, etc. The exposed portion of the display screen in the folded state can be utilized to display icons associated with applications that are of likely …


Heightened Security Measures For Marked Applications, Rachel Hausmann, Collin Irwin Dec 2019

Heightened Security Measures For Marked Applications, Rachel Hausmann, Collin Irwin

Defensive Publications Series

A system is described that enables a computing device (e.g., a mobile phone, a camera, a tablet computer, etc.) to associate an application with a security level (e.g., a high-sensitive level, a middle-sensitive level, a low-sensitive level, etc.), and provide additional security mechanisms (e.g., auto-lock, biometric authentication, password authentication, etc.) to the application based on the security level. A user may set a security level for an application, and the computing device may provide additional security mechanisms to the application based on the selected security level. For example, a user may associate a banking application with a high-sensitive security level, …


Inserting Multimedia Content Captured By One Device Into A Document On Another Device, Thomas Deselaers, Victor Carbune Dec 2019

Inserting Multimedia Content Captured By One Device Into A Document On Another Device, Thomas Deselaers, Victor Carbune

Defensive Publications Series

Many applications include capabilities that allow users to capture and insert multimedia content into a document by capturing it with the device camera. However, document creation and editing tasks are often performed on traditional desktop or laptop computers on which the camera is typically positioned in a fixed location above the screen. Capturing multimedia content that includes matter other than that located directly in front of the computer screen is awkward and often infeasible. On the other hand, integrating multimedia content captured by another device into a document being edited on the separate device requires a cumbersome and inefficient multi-step …


Suggesting Titles For Audio Recordings, Itay Inbar, Amit Pitaru, Isaac Blankensmith, Dror Ayalon, Tiago Camolesi, Guilherme Santos, James Lemieux, Sherry Lin, Jason Cho Dec 2019

Suggesting Titles For Audio Recordings, Itay Inbar, Amit Pitaru, Isaac Blankensmith, Dror Ayalon, Tiago Camolesi, Guilherme Santos, James Lemieux, Sherry Lin, Jason Cho

Defensive Publications Series

Techniques of this disclosure may enable a computing device to suggest one or more titles based on the content of audio being recorded or audio that was previously recorded, and other data such as time and location. Rather than applying a general default title or audio file name, the computing device may request authorization from a user to analyze the contents of a recorded audio file and, after receiving explicit authorization from the user, analyze the audio, including speech, and automatically suggest titles that are indicative of the content of the audio and/or other data. The computing device may convert …


Efficient Wireless Network Scans For Computing Devices, Kai Shi, Kumar Anand Dec 2019

Efficient Wireless Network Scans For Computing Devices, Kai Shi, Kumar Anand

Defensive Publications Series

Computing devices increasingly provide wireless network connections rather than wired network connections. In order to support the wireless network connections, the computing devices scan for wireless access points (WAPs) in a number of different ways that may avoid needless consumption of power. For example, the computing devices may support periodic preferred network offload (PNO) scans that enable low-power wireless network scans for so-called “preferred networks” while the primary processor is in a low power (or, in other words, stand-by state). The computing devices may also separately enable roaming scans for switching between WAPs associated with the same wireless network (e.g., …


Gesture Based Activation Of Private Mode, Nabil Shahid Dec 2019

Gesture Based Activation Of Private Mode, Nabil Shahid

Defensive Publications Series

Applications executing at a computing device may operate in a variety of modes, including a regular mode and a private mode. When operating in the private mode, the application may refrain from storing activity information. For instance, when operating in the private mode, a web browser application may refrain from storing browsing history, cookies and site data, and/or information entered in forms. Similarly, when operating in the regular mode, the web browser application may store, after receiving user authorization, browsing history, cookies and site data, and/or information entered in forms. A user may cause an application to operate in the …


A Method To Provide Print Control Over Heterogeneous 3d Print Buckets, Hp Inc Dec 2019

A Method To Provide Print Control Over Heterogeneous 3d Print Buckets, Hp Inc

Defensive Publications Series

How could a company make sure that their intellectual property is being used correctly and according to the

agreements set with Print-Service-Providers (PSP) So far the copyright laws did not catch up to this new 3D print

world and one of the challenges is to enable Content Providers to track the agreements set with PSPs, and allowing

management of thousands of different PSPs printing a variety of models per bucket (3D bed filled with objects to be

printed). Some of these models can have copyright and some not, creating a heterogeneous print bucket. The models

in the bucket may have …


Semi-Auto Reel To Reel Install Of New Web Wipe For 3d Printer And Wide Format Printers, Hp Inc Dec 2019

Semi-Auto Reel To Reel Install Of New Web Wipe For 3d Printer And Wide Format Printers, Hp Inc

Defensive Publications Series

To handle the high volume of prints typical to 3D Printing or large format printing, Web

Wipes are at a high frequency installed manually by heavily trained operators. Installing

a Web Wipe is a challenging task that involves the user reaching into the machine from

the front and the top simultaneously. This is very cumbersome and time-consuming,

especially for smaller individuals, and can be very messy getting agent/ink on the user

and the machine. In a production environment the downtime of this task contributes

significantly to the overall operating expense of the equipment.


Identify Print Quality Or Sub-System Degradation Issues For 3d Printers Using Layer Time Analysis, Hp Inc Dec 2019

Identify Print Quality Or Sub-System Degradation Issues For 3d Printers Using Layer Time Analysis, Hp Inc

Defensive Publications Series

One of the core concepts in additive manufacturing is to have accurate powder deposition on bed

with uniform duration throughout the print job. The inaccuracy in job layer duration arising when

some layers take more or lesser than the recommended value, often results in bad part quality issue

or indicate issues with print hardware components.

This disclosure describes a method for improving Print Quality (PQ) and reduce unplanned

downtime (due to sub-system failure) by looking at layer time for the print cycles and figuring if

they are running off the prescribed limits for the material used. Based on this information …


Constant Pressure Valve To Compensate Extraction System Pressure Variations, Hp Inc Dec 2019

Constant Pressure Valve To Compensate Extraction System Pressure Variations, Hp Inc

Defensive Publications Series

Some 3D Printing technology heavily depends on the internal printing conditions in the

Printing Chamber. One of the most important variables are temperature and pressure.

The first permits to have temperature in a narrow range in order to have powder surface

at constant conditions for printing process. Pressure and pressure distribution inside the

chamber permits defined airflows within this cabinet.

Energy sources may include Fusing Lamps and Top Lamps. As the powder itself has a

particular reflectance, not all the energy is absorbed, but reflected inside the printing

chamber. Additionally, there are other heat sources in order to keep the …


Automatic Arch Recovery For 3d Powder Loading Systems, Hp Inc Dec 2019

Automatic Arch Recovery For 3d Powder Loading Systems, Hp Inc

Defensive Publications Series

Disclosure to explain an automated system which detects powder low flowability and executes an arch

recovery increasing the powder flow and allowing successful powder loading for 3D systems.

Powder flowability is affected by multiple factors (powder type, recycled powder condition, humidity,

temperature) which alters the loading time and successful loading finish rate. In some cases, and specially

with some powder types such as PA11, it has been observed that the powder gets stuck to the walls of its

container decreasing the flow and increasing the loading times.

To avoid this effect, an arch recovery can be executed once the powder …


A Job Tree Structure To Track Auto Generated Build Envelope Status And Consumption, Hp Inc Dec 2019

A Job Tree Structure To Track Auto Generated Build Envelope Status And Consumption, Hp Inc

Defensive Publications Series

When a 3D printer user wants to print a job and do an external cooling, he needs to indicate this prior

to sending the job to the printer, so the system can behave accordingly to ensure the best part quality

possible. One of the actions of the system consists in generating a build envelope to physically protect

the build content when it is transferred to the external cooling unit. The user always wants to have some

information about all the printed parts, including the autogenerated ones. Thus, we need to provide a

mechanism to be able to track what happens …


Improving 3d Printed Part Quality Using Artifical Neural Networks Of The Generative Adversarial Type, Hp Inc Dec 2019

Improving 3d Printed Part Quality Using Artifical Neural Networks Of The Generative Adversarial Type, Hp Inc

Defensive Publications Series

The challenges for digital manufacturing today are vast. Challenges like reproducibility and

mechanical properties preservation are crucial. Currently, 3D printed parts are affected by each

build setup. The thermal diffusion occurring in the process affects the final product once it has

cooled down.


Dynamic System To Raise The Build Unit Platform During Uncaking, Hp Inc Dec 2019

Dynamic System To Raise The Build Unit Platform During Uncaking, Hp Inc

Defensive Publications Series

Disclosure to explain a new system that automatically raise the build unit platform during the uncake

operation in a powder Processing Station.

The current system requires the operator to push an up or down button to move the platform during the

uncake when the recycled powder is being vacuum. When the operator pushes the up button, the

platform is being raised to the top position in order to continue the process.

With the system proposed here, during an unpack operation, a laser sensor reads the distance, so it can

calculate when the powder has been removed and the platform could …


Automatic Generation Of 3d Camouflage And Other Patterns, Hp Inc Dec 2019

Automatic Generation Of 3d Camouflage And Other Patterns, Hp Inc

Defensive Publications Series

This disclosure relates to the field of 3D printing. We use the colors, patterns, and textures of a terrain

to generate 3D surfaces and objects that are camouflaged in that environment. We can automatically

scan the visual information using cameras, depth cameras, and other visual sensors, or we can work

from photos, videos, or even descriptions. We then generate a 3D model of a surface from this visual

information. This means that a 3D printer deployed in a region can generate on‐the‐fly objects

camouflaged for that region.


External Heating Device To Facilitate Unpacking Process In Powder Processing Station, Hp Inc Dec 2019

External Heating Device To Facilitate Unpacking Process In Powder Processing Station, Hp Inc

Defensive Publications Series

This disclosure relates to the field of 3D Printing with Thermoplastic Polyurethane (TPU) material. The

process to print parts using this material has very strict timing constraints.

An accessory is disclosed that provides the user more flexibility by preventing the loss of temperature

during the unpack process, leading to enhanced part quality. The system described can be assembled on

the processing station and used during the unpack of TPU parts.


Fast Cleaning Roll Snapping Installation System Solution For 3d And Large Format Printers, Hp Inc Dec 2019

Fast Cleaning Roll Snapping Installation System Solution For 3d And Large Format Printers, Hp Inc

Defensive Publications Series

Cleaning roll is a high frequency replacement supply used in the 3D and Large Format

printers used for doing an automatic servicing of the Print heads of the system. The

replacement workflow is a challenging and time-consuming task that involves the user

reaching into the machine from the front and top simultaneously with a limited space

available.

In a production environment the downtime of the tasks contributes significantly to the

overall operating expense of the equipment.


Providing Content Items Based On Determination That A Chat Conversation Relates To A Business Transaction, Anonymous Dec 2019

Providing Content Items Based On Determination That A Chat Conversation Relates To A Business Transaction, Anonymous

Defensive Publications Series

An online messaging application receives content that describes a conversation conducted via the online messaging application between a user and a business entity having a presence on the online messaging application. Features are extracted from the content and a transaction prediction model is applied to predict a likelihood that the conversation describes a transaction between the user and the business entity. Based on the predicted likelihood that a transaction has occurred, content items are identified for presentation to the user.


Return-Oriented Programming Detection And Prevention Utilizing A Hardware And Software Adaptation, Alex Levin Dec 2019

Return-Oriented Programming Detection And Prevention Utilizing A Hardware And Software Adaptation, Alex Levin

Defensive Publications Series

This publication describes techniques aimed at detecting and preventing return-oriented programming (ROP) attacks. The techniques consist of a software adaptation which enables supplemental hardware, specifically a system on a chip (SoC), to chronologically log return (ret) addresses of pushed stack frames and compare those logged ret addresses to ret commands executed by a central processing unit (CPU) of a computing system. When the SoC determines that ret commands executed by the CPU have deviated from the logged ret addresses, then the SoC can take action to thwart a ROP attack.


Dot Product Matrix Compression For Machine Learning, Anonymous Dec 2019

Dot Product Matrix Compression For Machine Learning, Anonymous

Defensive Publications Series

When pairwise dot products are computed between input embedding vectors and the dot product is used for further computation, the number of dot products grows quadratically with the number of embedding vectors. This can cause an efficiency bottleneck and affect performance of machine learning models. This disclosure describes techniques to obtain a compressed dot product matrix from input sparse embeddings. The compressed embeddings are used to obtain a compressed dot product. The compressed embeddings are generated using a weights matrix that is initialized randomly and learnt alongside other parts of the model. To improve performance, attention weights derived from the …


A Soultion With Stealth Fastener For Cosmetic Enhancement, Hp Inc Dec 2019

A Soultion With Stealth Fastener For Cosmetic Enhancement, Hp Inc

Defensive Publications Series

Prior solutions most of parts fastened by screw


Improved Message Facilitator For On-Time And Quick Response, Amy Zhang, Cliff Sze Dec 2019

Improved Message Facilitator For On-Time And Quick Response, Amy Zhang, Cliff Sze

Defensive Publications Series

Increasing reliance on written electronic communication has created a need for automated ways for users to efficiently manage and respond to the various emails, texts, and other electronic messages that they receive. Some solutions have already been introduced to help remind users respond to messages after some number of days have passed, and to help users compose messages. However, through the use of natural language processing, these features can be improved so that users are kept aware of pending response deadlines, and presented with proposed responses that take account of the context of a given message, as well as any …


Camera Test Station And Pallet Design For Measuring 3d Print Powder, Hp Inc Dec 2019

Camera Test Station And Pallet Design For Measuring 3d Print Powder, Hp Inc

Defensive Publications Series

A text fixture for 3D print powder receives a pallet with multiple powder wells

for assessment of whether the various powders are suitable for recycling for use in

producing high quality 3D-printed parts.


Preheated Air Inlets For Additive Manufacturing, Hp Inc Dec 2019

Preheated Air Inlets For Additive Manufacturing, Hp Inc

Defensive Publications Series

Cooling air in an additive manufacturing system is supplied at a set

temperature higher than the operating temperature range of the system in order to ensure

proper cooling of parts fabricated in the print bed.