Patents
Literature
Eureka-AI is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Eureka AI

2142 results about "Numeric Value" patented technology

Information in the form of a numeral contained in a data field.

Software architecture for high-speed traversal of prescribed routes

Systems, methods, and apparatuses for high-speed navigation. The present invention preferably encompasses systems, methods, and apparatuses that provide for autonomous high-speed navigation of terrain by an un-manned robot. By preferably employing a pre-planned route, path, and speed; extensive sensor-based information collection about the local environment; and information about vehicle pose, the robots of the present invention evaluate the relative cost of various potential paths and thus arrive at a path to traverse the environment. The information collection about the local environment allows the robot to evaluate terrain and to identify any obstacles that may be encountered. The robots of the present invention thus employ map-based data fusion in which sensor information is incorporated into a cost map, which is preferably a rectilinear grid aligned with the world coordinate system and is centered on the vehicle. The cost map is a specific map type that represents the traversability of a particular environmental area using a numeric value. The planned path and route provide information that further allows the robot to orient sensors to preferentially scan the areas of the environment where the robot will likely travel, thereby reducing the computational load placed onto the system. The computational ability of the system is further improved by using map-based syntax between various data processing modules of the present invention. By using a common set of carefully defined data types as syntax for communication, it is possible to identify new features for either path or map processing quickly and efficiently.
Owner:CARNEGIE MELLON UNIV

System and Method for Auditing a Security Policy

Provided a computerized system and method of automated auditing a range of rules associated with an enforced security policy. The method comprises automated obtaining log records assigned to a first rule within the range of rules and logged during a counted period, each said log record comprising a unique rule identifier and recorded values of respective arguments comprised in the rule; counting a number of records matching certain recorded values and logged within certain time intervals within the counted period (counted values); and automated generating a counted log record assigned to said rule, said record comprising the unique rule identifier, the counted period, recorded values of the rule arguments and respective counted values. The method further comprises obtaining a plurality of objects engaged in said first rule; resolving a first object among said plurality of objects to a set of resolved values; matching said resolved values to the recorded values of the respective arguments, said recorded values comprised in the counted log record assigned to said rule; counting each match in accordance with respective counted value, thus giving rise to a plurality of matching values of the resolved values; and using the plurality of matching values for analysis related to usage of the first object.
Owner:TUFIN SOFTWARE TECH

Method and system for cyber-security vulnerability detection and compliance measurement (CDCM)

Method and System for Cyber-Security Vulnerability Detection and Compliance Measurement (CDCM) provides any entity, organization or individual with access to or possession of sensitive, confidential or secret information, defined as “protected information,” in digital format that is received, processed, stored or distributed by a computer, computer system or digital processing equipment with the capability to detect and respond to cyber security vulnerabilities and to measure compliance with cyber-security requirements as established by the Federal Security Information Management Act (FISMA) for the security of protected information and certain additional related desirable or mandatory cyber-security requirements. In one sample embodiment of the invention, the method utilizes a damage assessment function; a security assessment function; a security plan or planning function; a training management function; a response management function; a cyber-security management function; a scoring measurement function; and a review and analysis function; to establish a quantifiable and definitive numerical measurement of the relative compliance of a specific processing system, at a specific point in time, to a defined and established threshold value of performance, or compliance acceptance, and to provide, assemble and be capable of archiving the supporting parameters, status, states and analysis that is specifically associated with the numerical value which represents the specific processing system's state of compliance at the specified time and to utilize various intermediate values and parameters to manage and enhance the performance of the specific system thereby improving the systems compliance score and numerical performance measurement value.
Owner:GEARHART GLENN

Noise-enhanced convolutional neural networks

A learning computer system may include a data processing system and a hardware processor and may estimate parameters and states of a stochastic or uncertain system. The system may receive data from a user or other source; process the received data through layers of processing units, thereby generating processed data; apply masks or filters to the processed data using convolutional processing; process the masked or filtered data to produce one or more intermediate and output signals; compare the output signals with reference signals to generate error signals; send and process the error signals back through the layers of processing units; generate random, chaotic, fuzzy, or other numerical perturbations of the received data, the processed data, or the output signals; estimate the parameters and states of the stochastic or uncertain system using the received data, the numerical perturbations, and previous parameters and states of the stochastic or uncertain system; determine whether the generated numerical perturbations satisfy a condition; and, if the numerical perturbations satisfy the condition, inject the numerical perturbations into the estimated parameters or states, the received data, the processed data, the masked or filtered data, or the processing units.
Owner:UNIV OF SOUTHERN CALIFORNIA

Tx back channel adaptation algorithm

Disclosed is a method and system that adapts coefficients of taps of a Finite Impulse Response (FIR) filter to increase elimination of Inter-Symbol Interference (ISI) introduced into a digital communications signal due to distortion characteristics caused by a real-world communications channel. In the communications system there is a Finite Impulse Response (FIR) filter. The FIR filter has at least one pre and/or post cursor tap that removes pre and/or post cursor ISI from the signal, respectively. The pre/post cursor taps each have pre/post cursor coefficients, respectively, that adjusts the effect of the pre/post cursor portion of the FIR filter. The FIR filtered signal is transmitted over the channel which distorts the signal due to the changing and/or static distortion characteristics of the channel. The channel distorted signal is received at a receiver that may pass the channel distorted signal through a quantifier/decision system (e.g., a slicer) as the quantifier input signal to quantify the quantifier input signal to one of multiple digital values. The channel distorted signal may be further adjusted by summing the channel distorted signal with the output of a Decision Feedback Equalizer (DFE) filter to create a DFE corrected signal which then becomes the quantifier input signal. An error signal is determined by finding the difference between the scaled quantifier decision and the quantifier input signal. The pre/post cursor coefficient values that adjust the effects of the pre/post cursor taps of the FIR filter are updated as a function of the error signal and at least two quantifier decision values, and update coefficient values, may be sent over a communications back-channel to the FIR filter.
Owner:AVAGO TECH INT SALES PTE LTD

Intelli-voyage travel

A system to improve user messaging in a mobile device by providing an intelligent interactive travel as a GUI that receives verbal and text input and outputs offers to provide travel-related information, offers to provide travel-related actions, offers to send a travel-related communication, or offers to save travel-related information, wherein processing content of the user input comprises analyzing message content to collect travel-related parameters relating to geographic travel path, airport information, air travel route information, airline flight information, flight availability, flight status, flight booking information, flight cancelling information, airport fees, baggage fees, local and remote ground transportion options, local and remote weather information, message priority, channel type, channel availability, user schedule, user time zone, user time and date, user travel-related preferences, type of content, and number of recipients, and saving said collected parameters to memory, wherein the travel-related parameter is calculated using a travel-related index, the travel-related index comprising a numerical value based on travel-related hierarchy, wherein the one or more programs include instructions for providing feedback to the user wherein the feedback comprises a graphical or spoken output from the portable electronic device, said output comprising information linked to the user schedule and one or more travel-related parameters, wherein the user schedule parameter is compared to a travel-related parameter and a scheduling database is populated with an entry that uses the comparison data and, wherein specific customized travel-related profile parameters are set to establish priority overrides where a user schedule has a different priority than a travel-related parameter.
Owner:VADODARIA VISHAL

Method for embedding electronic watermark and method for decoding the same

The present invention applies a technique, which is characteristic of color images, to embed a digital watermark in a color image and decode the embedded digital watermark. The technique adjusts a color signal transformation matrix by adding or subtracting a digital watermark matrix to or from the color signal transformation matrix in the process of transforming image data of an original color image in an RGB colorimetric system into image data in a YCbCr colorimetric system with the color signal transformation matrix. The digital watermark matrix includes an arbitrary numerical value of real number x, which represents digital watermark information, as an entry thereof and satisfies a condition that a sum of respective entries in each row and in each column is all substantially equal to zero. The technique inversely transforms the image data, which is obtained by the transformation with the adjusted color signal transformation matrix, into the image data in the RGB calorimetric system by means of an inverse color signal transformation matrix. The inversely transformed image has the numerical value of real-number x embedded therein as the digital watermark. The numerical value of real number x is decoded from transformed image data, which is obtained by transforming the original image into color signals in the YCbCr colorimetric system.
Owner:KOWA CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products