Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

557 results about "Target level" patented technology

Target Levels (also referred to as QLI “Qualified List Item”) are used in the Marketing module of Oracle BI to identify and count the members of a segment that should be contacted within a marketing campaign.

Mobile fitness and personal caloric management system

A user's personal biometric information such as age, sex, weight, height as well as the user's lifestyle information, such as daily caloric input, job description, smoker status and physical fitness, is uploaded onto a host computer. Target heart rate, energy and/or caloric consumption levels related to desired fitness and weight loss goals for a particular individual are then selected having regard to fitness levels for an individual of comparable age, and consuming similar calories are then downloaded to a caloric monitoring unit. The caloric monitoring unit is provided for measuring the user's heart rate and dynamic energy and/or caloric expenditure over one to four weeks. The caloric monitoring unit includes a heart rate monitor, a unit accelerometer, a global positioning system (GPS), and an audio and/or video output. The audio/video output is operable to provide information and/or motivational prompts to the user in the event the heart rate, energy expenditure and/or caloric expenditure falls below or exceeds pre-selected target expenditures over a particular time segment of the selected time period having regard to the calories which are consumed. A display provides a continuously updated visual indication of whether or not the use has achieved the pre-selected optimum caloric burn or energy expenditure for that particular time segment. An internal calendar/clock, a processor and/or memory in the caloric monitoring unit compares measured heart rate and energy expenditures for multiple time segments against target levels stored as the user-specific fitness programme tailored to achieve the desired weight loss. The comparison is then used to generate compliance output data to either the user and/or a nutritionist.
Owner:SALIENT IMAGING

Network configuration manager

A policy engine generates configlets that are vendor-neutral, vendor-specific or both, based on a selected target level and a selected device / device group. A translator translates and combines the configlets to form vendor-dependent configuration files. The policy engine generates the configlets using policies associated with the selected target level and its sub-target levels, as defined by a target level hierarchy. A policy includes at least a condition, and an action which the policy engine performs if the condition is true. In performing the action, the policy engine typically writes to at least a partial configlet. A policy may further include a verification clause, which is used to verify a running configuration. Policy dependencies may also be defined such that where a second policy is dependent on a first policy, the second policy must be evaluated after the first policy. This is necessary, where, for example, the first policy generates and stores a value to be used by the second policy. Policies are small programs. A configlet hierarchy is defined, such that a child configlet inherits properties which it does not define from its parent. A mapping function maps infrastructure data in a first format to a second format, so that the second format is recognizable by the policy engine. A loader batches, schedules and loads a configuration file to its intended device. Upon replacing a first device using a first configuration format with a second device using a second configuration format, the first device's configuration is read in or uploaded and reverse-translated into configlets. The configlets are then translated into a configuration formatted for the second device. The system retains device logins and passwords in encrypted format. A user desiring to connect to a device must log in to the system instead. The system in turn logs in or connects to the device and passes information back and forth between the user and the device, as if the user were logged directly into the device.
Owner:INT BUSINESS MASCH CORP

Target drive ventilation gain controller and method

A gain controller and method for controlling the value of a gain is used in conjunction with an electrode array for detecting a signal representative of respiratory drive output of a patient during inspiration, and a lung ventilator for assisting inspiration of the patient. The gain controller comprises an input for receiving the signal representative of respiratory drive output; a comparator for determining whether the signal representative of respiratory drive output is higher or lower than a target drive signal; and a gain adjustment unit for increasing the value of a gain when the amplitude of the signal representative of respiratory drive output is higher than the amplitude of the target drive signal and for decreasing the value of this gain when the amplitude of the signal representative of respiratory drive output is lower than the amplitude of the target drive signal. The gain is applied to the signal representative of respiratory drive output to produce an amplified respiratory drive output representative signal used for controlling the lung ventilator. The advantage of target drive ventilation is that this mode of ventilation does not depend on pressure, flow or volume measurements. A leaky ventilatory line will introduce a change in respiratory drive which will change the ventilatory assist in order to return the respiratory drive to its target level. Also, changes in the patient's metabolic or patho-physiological status which result in altered respiratory drive will be compensated.
Owner:UNIV DE MONTREAL

Data communication method and device

The invention provides a data communication method and device. The method comprises the following steps: transmitting an identity authentication request to a server, wherein the identity authentication request comprises user public key information; receiving authentication response information of the identity authentication request, wherein the authentication response information comprises server public key information; conserving the server public key information; transmitting a key negotiation request to the server, wherein the key negotiation request comprises user encryption information; receiving negotiation response information of the key negotiation request, wherein the negotiation response information comprises encryption information of a communication key; determining the communication key according to the negotiation response information; generating a variety of levels of encryption ways in accordance with a preset encryption strategy; selecting the encryption way of a target level according to the security level of business data; and using the encryption way of the target level to encrypt the business data and transmitting the target level and the encrypted business data to the server. The data communication method provided by the invention can improve the encryption strength and the encryption flexibility.
Owner:北京明朝万达科技股份有限公司

Network configuration manager

A policy engine generates configlets that are vendor-neutral, vendor-specific or both, based on a selected target level and a selected device/device group. A translator translates and combines the configlets to form vendor-dependent configuration files. The policy engine generates the configlets using policies associated with the selected target level and its sub-target levels, as defined by a target level hierarchy. A policy includes at least a condition, and an action which the policy engine performs if the condition is true. In performing the action, the policy engine typically writes to at least a partial configlet. A policy may further include a verification clause, which is used to verify a running configuration. Policy dependencies may also be defined such that where a second policy is dependent on a first policy, the second policy must be evaluated after the first policy. This is necessary, where, for example, the first policy generates and stores a value to be used by the second policy. Policies are small programs written as small programs. A configlet hierarchy is defined, such that a child configlet inherits properties which it does not define from its parent. A mapping function maps infrastructure data in a first format to a second format, so that the second format is recognizable by the policy engine. A loader batches, schedules and loads a configuration file to its intended device. Upon replacing a first device using a first configuration format with a second device using a second configuration format, the first device's configuration is read in or uploaded and reverse-translated into configlets. The configlets are then translated into a configuration formatted for the second device. The system retains device logins and passwords in encrypted format. A user desiring to connect to a device must log in to the system instead. The system in turn logs in or connects to the device and passes information back and forth between the user and the device, as if the user were logged directly into the device.
Owner:IBM CORP

Device and method for testing chloride corrosion of reinforced concrete member under continuous load

The invention provides a device and method for testing chloride corrosion of a reinforced concrete member under a continuous load. The device comprises a continuous load loading device, a rapid chloride corrosion device and a measurement and control device. A continuous load is applied by a loading frame and a drive device, a frame body is filled with a chloride solution and is fixed at the upper-middle part of a test beam in a sealing manner, air is continuously injected in the chloride solution by adopting an air pump, and direct current is introduced into reinforced steel bars of the test beam to implement the rapid corrosion. Relevant data acquirers, electrochemical testers and output equipment which are controlled through a single chip microcomputer in a unified manner are integrated in the main control box, the continuous load is measured in real time, and periodically corrected to a target level, corrosion behaviors of a corroded member are periodically tested, and data are acquired, displayed, stored, printed and output in real time. The device is capable of effectively simulating an actual corrosion working condition of the on-active service reinforced concrete structure member under the coupling effect of a chloride environment and the load, and provides a scientific basis for evaluating the durability of engineering structures under chloride environments such as sea and salt lakes.
Owner:HOHAI UNIV

Method for evaluating hydrocarbon potential key parameters of high-quality hydrocarbon-source rock

The invention discloses a method for evaluating hydrocarbon potential key parameters of high-quality hydrocarbon-source rock, and belongs to the technical field of oil and gas resource evaluation. The method includes the key steps of firstly, determining an immature and low-mature oil hydrocarbon expelling threshold, a normal hydrocarbon threshold and a normal hydrocarbon expelling threshold of high-quality hydrocarbon-source rock according to geochemistry data of hydrocarbon-source rock; secondly, establishing the hydrocarbon-source rock hydrocarbon amount and a hydrocarbon rate evaluating model; thirdly, establishing the hydrocarbon-source rock hydrocarbon expelling amount and a hydrocarbon expelling evaluating model, and evaluating the target level hydrocarbon-source rock hydrocarbon expelling amount and hydrocarbon expelling rate key parameters; fourthly, establishing a high-quality hydrocarbon-source rock organic carbon recovery coefficient evaluating model, and evaluating a target level hydrocarbon-source rock organic carbon recovery coefficient; fifthly, evaluating a research area target level high-quality hydrocarbon-source rock hydrocarbon potential plane graph, and analyzing the relation between the plane graph and tight oil hydrocarbon contribution. Immature and low-mature stage hydrocarbon potential key parameters of high-quality hydrocarbon-source rock are subjectively and accurately evaluated, and the blank, weakened by people in the past, of immature and low-mature stage hydrocarbon of high-quality hydrocarbon-source rock is filled in.
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products