Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

155 results about "Visual Basic" patented technology

Visual Basic is a third-generation event-driven programming language from Microsoft for its Component Object Model (COM) programming model first released in 1991 and declared legacy during 2008. Microsoft intended Visual Basic to be relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.

User Interface Image Element Display and Adaptation System

A system provides a single-click expandable data control implemented in a user interface development language as a data entry and viewing element including options enabling or restricting data entry and specifying a related dialog for entry or selection of data for a primary display field. A system provides a single-click expandable data element in HTML, for example, as a data entry and viewing element that is used within a user interface interactive page to allow a single line-height data display using a single mouse click to expand or collapse data, thereby providing a simple means for a user to view or enter larger amounts of data than typically fit within the limited screen space. A user interface system adaptively presents information to a user. The system includes a display processor for initiating generation of data representing an image. The image includes, an image element box comprising a text data presentation row automatically expandable into multiple text data presentation rows in response to user selection of the image element box. An executable procedure associated with the image element box determines whether text in the multiple text data presentation rows is at least one of, (a) delete only, (b) read-only and (c) readable and writable. The executable procedure is in a user interface compatible code language (e.g., HTML, SGML, XML, Visual Basic) and execution of the executable procedure is initiated in response to user selection of the image element box.
Owner:SIEMENS MEDICAL SOLUTIONS USA INC

Hybrid CNC control system

The present invention demonstrates an improved CNC Control system, which integrates operator-induced changes into the pre-programmed CNC machining process. The improved CNC Control system develops a Human Activity Storage Program (HASP), which is used for subsequent production in conjunction with and simultaneously with the Numerical Control Program thereby enhancing the production process by integrating the skilled machinist's input into the production process. The numerical control program of a CNC machine is interfaced with an IBM compatible personal computer (PC) to make information relative to the block number, feed-rate and / or spindle speed over-ride values available at the personal computer. If the CNC Control has been re-configured properly (with regard to the ladder interface and operating system) a PC computer is not required. During the machining of a part the machine operator will manually over-ride the feed-rate and / or the spindle speed to optimize machining performance. Through the use of VISUAL BASIC OR C++programming modules and routines, the spindle speed and feed-rate controls (located at the CNC Control) are polled at frequent or 5OO ms intervals. The status or over-ridden values of these controls are correlated to the active block number in use during each polled sequence and this information is written to an "event file". After the subject part has been completed, one of two options can be used. An "edit phase" is initiated which utilizes the information in the "event file" to reconstruct the MCD file. After the edit phase is complete, the resultant output "Optimized MCD" can be used to produce like parts with confidence that all motion is running at peak performance and all programmed trajectories are maintained. The cycle can be repeated again (if desired) to ensure even greater efficiency while cutting. In the alternative, the event file can be employed to "command" the CNC Control with respect to feed-rate and / or spindle speed over-ride settings.
Owner:ALLEN WILLIAM D

Traveling crane positioning system and positioning method

InactiveCN101143686AAccurately run reference dataIntuitive surface informationLoad-engaging elementsVisual BasicData acquisition
The invention relates to an overhead traveling crane positioning system and a positioning method, which adopts an industrial control computer as the core, organically integrates the industrial control computer, data collection cards, a lower computer PLC and a sensor and fully displays the advantages of all the parts. Without changing the design and the control scheme of the original overhead traveling crane, the invention adopts a high-precision laser sensor and an encoder to measure and obtain the distances in the x, y and z directions of the overhead traveling crane, sends the distances into the CPU of the industrial control computer by different types of data collection cards, meanwhile, adopts the OPC technology to read the running status of the overhead traveling crane from the lower computer PLC to an upper computer: the industrial control computer through a CAN-bus, and then composes the data processing and interface display programs in Visual Basic and other high-level languages in the industrial control computer, to real time display the running position and status of the overhead traveling crane, so as to provide precise running data of the overhead traveling crane for the operator and lay a solid research foundation for the overhead traveling crane to be driven without a driver with high precision.
Owner:TIANJIN UNIVERSITY OF TECHNOLOGY

Malicious mobile code runtime monitoring system and methods

InactiveUS20060026677A1Minimizing serverMinimizing client resource requirementMemory loss protectionError detection/correctionVisual BasicMonitoring system
Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “re-communicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.
Owner:FINJAN LLC

Method and system for protecting a computer and a network from hostile downloadables

Protection systems and methods provide for protecting one or more personal computers (“PCs”) and / or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded / uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “re-communicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.
Owner:FINJAN LLC

Work state virtual simulation system for electric haulage shearer based on different geological conditions

A work state virtual simulation system for an electric haulage shearer based on different geological conditions belongs to automatic control and system simulation of shearers. The work state virtual simulation system comprises devices and a method, wherein the devices consist of a shearer work condition remote monitoring platform, a database, a remote controller, a visual basic system, an industrial Ethernet, a local controller and a machine-mounted detection control system. The method comprises the following steps of: acquiring shearer work condition parameters for the machine-mounted detection control system; carrying out data analysis on the shearer work condition parameters; finally, transmitting the shearer work condition parameters to the shearer monitoring platform for detecting and achieving through the local controller and the industrial Ethernet; on the basis of accessing an achieving database in real time, drawing fully mechanized coal faces under different geological conditions by applying a virtual real technology; and driving a shearer virtual sample machine to realize real reappearance of the work state of the shearer. A shearer virtual sample machine model is driven by using real-time work condition parameters provided by the machine-mounted detection control system, so that a shearer virtual simulation system has the field feeling entering the fully mechanized coal faces and favorable interaction.
Owner:CHINA UNIV OF MINING & TECH

Method and system for protecting a computer and a network from hostile downloadables

InactiveUS20060149968A1Minimizing serverMinimizing client resource requirementMemory loss protectionError detection/correctionVisual BasicPersonal computer
Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “re-communicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.
Owner:FINJAN LLC

Malicious mobile code runtime monitoring system and methods

Protection systems and methods provide for protecting one or more personal computers (“PCs”) and / or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java TN applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded / uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “recommunicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.
Owner:FINJAN LLC

Constant-temperature battery box of electric automobile and heat management control method of constant-temperature battery box

The invention provides a constant-temperature battery box of an electric automobile and a heat management control method of the constant-temperature battery box, model selection of battery box heat dissipation, heating and heat insulation materials is calculated and determined according to temperature field distribution obtained by FLUENT simulation of a battery pack under different charge-discharge multiplying power and at different wind speeds; when a battery box body is designed, a battery box casing, an air passage, a clamp and a fan door are particularly designed, and a solution is proposed for solving the problems of low temperature at two ends of the battery pack and the like; during study of the heat management control method, a set of heat management software and hardware control system is developed, wherein the hardware comprises a temperature collecting board and a temperature main control board, the software adopts FreecaleCodewarrior for programming, and fuzzy control is utilized to control a heating film and a fan to work; a remote monitoring system is responsible for real automobile data collection to facilitate system selection; and VB (visual basic) software is adopted to manufacture an upper computer interface of the battery heat management system, so that a temperature curve and a current temperature value can be displayed in real time, and historical data query can be performed.
Owner:长春北车电动汽车有限公司

Realization method of logic control of VB/VC (Microsoft Visual Basic 6.0/Microsoft Visual C++) and PLC (Programmable Logic Controller) on the basis of serial communication

The present invention provides a realization method of logic control of VB/VC (Microsoft Visual Basic 6.0/Microsoft Visual C++) and PLC (Programmable Logic Controller) on the basis of serial communication. The realization method provided by the invention is free of writing a logic T-shaped program in the PLC of a lower computer, all the logic controls may be realized at an upper computer, and industrial control may be realized. According to the new method provided by the invention, the upper computer is only needed to send instruments to realize monitoring of an input port and an output port with no need for writing any logic program in the PLC, and only one instrument is sent to perform all the stable and reliable monitoring of objects to be monitored (X, Y M, D and other elements); through adoption of a 'pipeline' mode in the aspect of signal decoding, operation coincidence of a CPU is reduced, and the response time of a program is short; and programs may be managed by category, the PLC of any point may be controlled without point limitation, and wiring, free of circuit interlocking, is greatly simplified in the aspect of circuit connection with safety and convenience.
Owner:SHANGHAI UNIV

Method for constructing CAM (computer-aided manufacturing) system for punching for automobile girders

A method for constructing a CAM (computer-aided manufacturing) system for punching for automobile girders is characterized by including selecting the types of used numerical-control punching production lines for the automobile girders; creating projects corresponding to the types of the numerical-control punching production lines for the automobile girders, building mathematical models of algorithms, and building generic modules; determining the types of the projects as Activex DII and compiling the types of the projects into types of dynamic linking libraries; writing and compiling interface programs connected with the dynamic linking libraries by VBA (visual basic for application); writing scripts for the various types of numerical-control punching production lines, and creating a CAM icon menu file and icons corresponding to various items; packaging various documents such as the CAM icon menu file, the interface programs written by the VBA, each class-generation DLL (dynamic linking library) compiled by VB (visual basic), development interfaces provided in the form of VB types, windows, the modules, the projects, an encryption method and instructions in a SETUP to form installation programs of the various types of numerical-control punching production lines for the automobile girders; and adding a CAM menu into a menu self-defining term in a CAD (computer-aided design).
Owner:广州市力鼎汽车零部件有限公司

Online correction method for interference of DC (Direct Current) power transmission line on geomagnetic observation

The invention relates to an online correction method for the interference of a DC (Direct Current) power transmission line on geomagnetic observation. The method is used for accurately solving the interference level of a specific DC power transmission line on a specific geomagnetic observation station, and correcting interfered geomagnetic observation data. The online correction method comprises the following steps of: establishing the DC power transmission line and an online database system of a geomagnetic station, and acquiring imbalance current a real-time circuit and geomagnetic observation data through an online data input interface. In the method, a system software platform is established through a VB (Visual Basic) programming technology; the data required for calculation is acquired from a database and the online data input interface; current magnetic field produced by a DC circuit is calculated according to a spatial three-dimensional computation model of the DC power transmission line; a spatial current magnetic field vector obtained through the calculation is projected in a geomagnetic observation direction; the interference level of current of the DC circuit to geomagnetic Z-component observation is finally obtained; and a geomagnetic observation is corrected.
Owner:STATE GRID ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products