Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

239 results about "User-defined function" patented technology

A user-defined function (UDF) is a function provided by the user of a program or environment, in a context where the usual assumption is that functions are built into the program or environment.

Firearm system for data acquisition and control

A microprocessor circuit that is used to monitor and control a firearm. The microprocessor circuit accomplishes this by monitoring various sensor & control inputs, and acting on these inputs to execute user defined functions. The microprocessor circuit can use the sensory input to determine firearm statistics. These statistics can include the number of times the firearm has been shot, the efficiency of the firearm automatic action, range-to-target, and et cetera. The firearm system can also use a combination of sensors to fabricate a bullet chronograph whereby the muzzle velocity of a cartridge can be determined. These statistics can be date-stamped and recorded into memory. Statistics from Law Enforcement firearms can be used for courtroom evidence and police reporting. These statistics can also be used for firearm maintenance and warranty repair. The microprocessor circuit can display the statistical data to the user via simple light emitting diodes, or sophisticated liquid crystal displays. Data can also be downloaded to a computer docking station as well. The microprocessor circuit can also display the information within the optics of a riflescope. When used in conjunction with a laser range finder sensor, the microprocessor circuit can adjust the electronic cross-hairs (reticle) to compensate for the bullet trajectory.
Owner:MCRAE MICHAEL WILLIAM

Parallelism performance analysis based on execution trace information

A system for conducting performance analysis for executing tasks. The analysis involves generating a variety of trace information related to performance measures, including parallelism-related information, during execution of the task. In order to generate the trace information, target source code of interest is compiled in such a manner that executing the resulting executable code will generate execution trace information composed of a series of events. Each event stores trace information related to a variety of performance measures for the one or more processors and protection domains used. After the execution trace information has been generated, the system can use that trace information and a trace information description file to produce useful performance measure information. The trace information description file contains information that describes the types of execution events as well as the structure of the stored information. The system uses the trace information description file to organize the information in the trace information file, extracts a variety of types of performance measure information from the organized trace information, and formats the extracted information for display. The system can use default or user-defined functions to extract and format trace information for display. After the system displays one or more types of performance measure information, a user of the system can then interact with the system in a variety of ways to obtain other useful performance analysis information.
Owner:CRAY

Firearm system for data acquisition and control

A microprocessor circuit that is used to monitor and control a firearm. The microprocessor circuit accomplishes this by monitoring various sensor & control inputs, and acting on these inputs to execute user defined functions. The microprocessor circuit can use the sensory input to determine firearm statistics. These statistics can include the number of times the firearm has been shot, the efficiency of the firearm automatic action, range-to-target, and etcetera. The firearm system can also use a combination of sensors to fabricate a bullet chronograph whereby the muzzle velocity of a cartridge can be determined. These statistics can be date-stamped and recorded into memory. Statistics from Law Enforcement firearms can be used for courtroom evidence and police reporting. These statistics can also be used for firearm maintenance and warranty repair. The microprocessor circuit can display the statistical data to the user via simple light emitting diodes, or sophisticated liquid crystal displays. Data can also be downloaded to a computer docking station as well. The microprocessor circuit can also display the information within the optics of a riflescope. When used in conjunction with a laser range finder sensor, the microprocessor circuit can adjust the electronic cross-hairs (reticle) to compensate for the bullet trajectory.
Owner:MCRAE MICHAEL WILLIAM

Parallelism performance analysis based on execution trace information

A system for conducting performance analysis for executing tasks. The analysis involves generating a variety of trace information related to performance measures, including parallelism-related information, during execution of the task. In order to generate the trace information, target source code of interest is compiled in such a manner that executing the resulting executable code will generate execution trace information composed of a series of events. Each event stores trace information related to a variety of performance measures for the one or more processors and protection domains used. After the execution trace information has been generated, the system can use that trace information and a trace information description file to produce useful performance measure information. The trace information description file contains information that describes the types of execution events as well as the structure of the stored information. The system uses the trace information description file to organize the information in the trace information file, extracts a variety of types of performance measure information from the organized trace information, and formats the extracted information for display. The system can use default or user-defined functions to extract and format trace information for display. After the system displays one or more types of performance measure information, a user of the system can then interact with the system in a variety of ways to obtain other useful performance analysis information.
Owner:CRAY

Digital ship model planar motion mechanism experimental method based on CFD software

The invention provides a digital ship model plane motion organization experimental method based on computation fluid dynamics CFD software FLUENT. The method includes applying a FLUENT pre-process software GAMBIT to establish a research object model and a control domain; arranging a triangle grid on the model surface, then arranging a unstructured grid in the control domain; setting the boundary condition, joining an user-defined function UDF document, introducing dynamic grid technology, using a finite volume method based on the complete unstructured grid, realizing a pure swaying movement, a pure rising and falling movement, a pure oscillatory movement, a pure pitching movement and a pure rolling movement carried on by a plane motion organization experiment; applying a science computation software MATLAB to do Fourier expansion of a force and a moment coefficient obtained by the FLUENT, being fitted by EXCEL least squares method, obtaining a hydrodynamic force coefficient of a vertical plane and a horizontal plane as well as the related hydrodynamics analysis by dimensionless. The invention carries on the digit plane motion organization experiment using the CFD software, can satisfy the request of hydrodynamic force data in the design initial period of a submersible.
Owner:HARBIN ENG UNIV

Security code activated access control system

An access control system that utilizes security codes (500), a database (430), and a control device (20) is disclosed. Each security codes (500) is comprised of a unique key code (502) that provides security in addition to a use code (503) that is used to convey specific user defined functions. The use code (503) may be determined by the security code requester (400) at the time of security code (500) charge out from the database (430). The database (430) controls the issuance of security codes (500) and the control device (20) validates the key code (502) within the security code (500) against key codes (502) within control device (20) memory and if valid, performs an action based on the validation of the use code (503) parameters. As the key codes (502) that are within the control device (20) memory are used, the control device (20) then self-regenerates the key codes (502) in order to extend the control device (20) service life indefinitely. The database (430) and the control device (20) have security code (500) activities that are synchronized, though the two operate independently and are not electronically connected. The system provides a secure interface for obtaining access authority from the database (430). Security code requesters (400) contact the database (430) and request security codes (500) in order to activate a specific control device (20). After database (430) issuance, the security codes (500) are then input by the security code user (420) at the control device (20) location and activates the control device (20) if the key code (502) matches the key code (502) within the control device (20) and the use code (503) parameters are validated by the control device (20). The control device (20) and the database (430) key codes (502) are synchronized. This allows an unlimited supply of security codes (500) to be issued by the database (430) and used by the control device (20).
Owner:YAGER DAVID FR +1

JDBC (java database connectivity) based data access layer building method and device utilizing same

The invention provides a JDBC (java database connectivity) based data access layer building method and a device utilizing the same, which solve the problem that the system is complicated in configuration due to difference between the architecture of programs and the programming mode during development of the data access layer. The JDBC based data access layer building method includes: generating a JDBC based data access layer frame generating component which comprises an architecture component and function controls by integrating with a source opening component and packaging user-defined function members; selecting a program architecture according to the architecture component, selecting the corresponding function control according to the selected program architecture to generate system configuration files and source program templates applicable to the program architecture, and building a data access layer through relevant program configurations by the selected program architecture and the system configuration files and the source program templates thereof. By the generating component capable of generating the framework and members of the data access layer, complexity of system development is reduced and time thereof is shortened, and uniformity and standardization of development of the data access layer are realized.
Owner:DATANG SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products