Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

485 results about "Code algorithm" patented technology

An algorithm in code looks like a food recipe or set of assembly instructions in English. The difference is that an algorithm in code is written in a programming language rather than in English (or some other human written language).

Scratch protection in tape data storage system

A method of redundancy coding of user data received from a host apparatus and storage of said coded data on a magnetic tape data storage medium comprises inputting a byte stream of user data into a buffer and assembling a plurality of data sets in the buffer; for each data set assembling a data set into a two-dimensional data array and (1103) applying a second redundancy coding algorithm (C2 parity) to the two-dimensional data set in a second dimension; applying (1105) a first redundancy coding (C1 parity) algorithm to the second redundancy coded data array in a first dimension to form a two-dimensional data frame having second and first redundancy coding in respective second and first dimensions, the two-dimensional data frame comprising a plurality of rows, each row comprising a first codeword and a plurality of columns, each column comprising a second codeword; partitioning the two-dimensional data frame into a plurality of logical track blocks (1106) each comprising a plurality of first codewords; and recording (1110) each logical track block to a corresponding respective physical track on the magnetic tape data storage medium. Redundancy coding of a data frame is distributed across a plurality of other data frames along the tape, and redundancy bytes of each data frame are distributed across a plurality of data tracks. Redundancy coding may be distributed diagonally across a width of the tape. Data obliterated due to damage to individual physical recorded tracks or sections of tracks on the tape may be recovered from redundant coding data distributed across other adjacent parallel physical tracks on the tape.
Owner:HEWLETT-PACKARD ENTERPRISE DEV LP

Data encoding in radio frequency identification transponders

A method and apparatus are provided for efficiently encoding source data in radio frequency identification (RFID) systems. The encoded source data may also provide additional functionality such as data error detection and correction. A source data encoding and decoding method for a RFID system having a RFID transponder comprises the steps of obtaining the source data, encoding to provide more efficient data encodation that may also include data error detection and error correction, writing the encoded source data to a RFID transponder, reading the encoded source data from the RFID transponder, and decoding the encoded source data to recover the original source data. The encoding may utilize bar code symbology algorithms or a non-Full ASCII enhanced functionality character set. A source data encoding device and a decoding device for a RFID system may comprise a memory, a processor for running a program stored in the memory, a bar code printer for printing a bar code, a RFID transponder programmer for writing the data to the RFID transponder, a RFID interrogator for interrogating the RFID transponder, and a bar code reader to read a bar code. The data may be provided encoded or the device may encode / decode the data using coding algorithms. The RFID transponder stores the encoded source data, that may utilize a non-Full ASCII enhanced functionality character set, and the encoded data may be retrieved to recover the original source data.
Owner:INTERMEC IP

Data encoding in radio frequency identification transponders

A method and apparatus are provided for efficiently encoding source data in radio frequency identification (RFID) systems. The encoded source data may also provide additional functionality such as data error detection and correction. A source data encoding and decoding method for a RFID system having a RFID transponder comprises the steps of obtaining the source data, encoding to provide more efficient data encodation that may also include data error detection and error correction, writing the encoded source data to a RFID transponder, reading the encoded source data from the RFID transponder, and decoding the encoded source data to recover the original source data. The encoding may utilize bar code symbology algorithms or a non-Full ASCII enhanced functionality character set. A source data encoding device and a decoding device for a RFID system may comprise a memory, a processor for running a program stored in the memory, a bar code printer for printing a bar code, a RFID transponder programmer for writing the data to the RFID transponder, a RFID interrogator for interrogating the RFID transponder, and a bar code reader to read a bar code. The data may be provided encoded or the device may encode / decode the data using coding algorithms. The RFID transponder stores the encoded source data, that may utilize a non-Full ASCII enhanced functionality character set, and the encoded data may be retrieved to recover the original source data.
Owner:INTERMEC IP

Security encryption authentication module for power distribution terminal communication and method thereof

The invention discloses a security encryption authentication module for power distribution terminal communication and a method thereof. The security encryption authentication module comprises a main control chip, a commercial code algorithm encryption chip, a communication interface and a storage unit; the main control chip is connected with the commercial code algorithm encryption chip, the communication interface and the storage unit and receives message information of a front-end processor of a distribution master station and a distribution terminal through safe interface software of the distribution terminal to overall manages the other modules, and the commercial code algorithm encryption chip encrypts or decrypts the message information received by the main control chip. The special encryption chip is adopted in the security encryption authentication module, response speed is increased, and dependence on a CPU and an internal storage is reduced. Besides, communication security is greatly improved by means of bidirectional authentication of verifying each other's identity between the security encryption authentication module and a distribution security interaction gateway.
Owner:STATE GRID CORP OF CHINA +4

On-line video abstraction generation method based on depth learning

The invention relates to an on-line video abstraction generation method based on depth learning. An original video is subjected to the following operation: 1) cutting the video uniformly into a group of small frame blocks, extracting statistical characteristics of each frame image and forming corresponding vectorization expressions; 2) pre-training video frame multilayer depth network and obtaining the nonlinearity expression of each frame; 3) selecting the front m frame blocks being as an initial concise video, and carrying out reconstruction on the concise video through a group sparse coding algorithm to obtain an initial dictionary and reconstruction coefficients; 4) updating depth network parameters according to the next frame block, carrying out reconstruction and reconstruction error calculation on the frame block, and adding the frame block to the concise video and updating the dictionary if the error is larger than a set threshold; and 5) processing new frame blocks till the end in sequence on line according to the step 4), and the updated concise video being generated video abstraction. With the method, latent high-level semantic information of the video can be excavated deeply, the video abstraction can be generated quickly, time of users is saved, and visual experience is improved.
Owner:HANGZHOU HUICUI INTELLIGENT TECH CO LTD

Procedure for exchanging useful information generated according to different coding laws between at least 2 pieces of user terminal equipment

If TDM connections are through-connected from the originating TDM network to the target TDM network via a data network in the form of backbone, e.g. VoIP, the switchover between the TDM network and the data network takes place via media gateways. As is the case with connections exclusively between TDM, the coding algorithms of the A face and the B face have to be identical. In TDM networks, coding is done according to A Law and μ Law. When switching from an A Law network to a μ Law network, the coding specifications have to be converted. In order to carry out a conversion in a TDM environment, at the switchover point the μ Law face has to convert to A Law. The same applies to VoIP. The invention relates to the integration of this switchover conversion rule in the codec negotiation procedure so that in principle a μ Law A face offers μ Law and, alternatively, A-Law to the B face; a μ Law B face accepts μ Law whereas an A-Law B face acknowledges A-Law. Furthermore, 64 kBit/s unrestricted preferred connections are considered in fall back mode, wherefore an additional logic is integrated into the codec modification procedure by means of which in principle μ Law and, as an alternative, A-Law are offered to the B face in addition to the transparent CODEC or instead of offering a μ Law A face to the TMR only. The B face first accepts the transparent CODEC on the basis of the list or the TMR ‘64 kBit/s unrestricted preferred’. When receiving the TMU, the B face selects the Codec to satisfy the code conversion rule.
Owner:NOKIA SIEMENS NETWORKS GMBH & CO KG

Frequency-domain scalable coding without upsampling filters

In a method of coding discrete time signals (X1) sampled with a first sampling rate, second time signals (x2) are generated using the first time signals having a bandwidth corresponding to a second sampling rate, with the second sampling rate being lower than the first sampling rate. The second time signals are coded in accordance with a first coding algorithm. The coded second signals (X2c) are decoded again in order to obtain coded / decoded second time signals (X2cd) having a bandwidth corresponding to the second sampling frequency. The first time signals, by frequency domain transformation, become first spectral values (X1). Second spectral values (X2cd) are generated from the coded / decoded second time signals, the second spectral values being a representation of the coded / decoded time signals in the frequency domain. To obtain weighted spectral values, the first spectral values are weighted by means of the second spectral values, with the first and second spectral values having the same frequency and time resolution. The weighted spectral values (Xb) are coded in accordance with a second coding algorithm in consideration of a psychoacoustic model and written into a bit stream. Weighting the first spectral values and the second spectral values comprises the subtraction of the second spectral values from the first spectral values in to obtain differential spectral values.
Owner:FRAUNHOFER GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG EV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products