Abstract:
Technologies are generally described for methods and systems effective to broadcast a message. In some examples, the methods may include receiving the message at a modulator. The modulator may receive a power signal configured to provide power to a closed conductive loop. The modulator may modulate the power signal using the message to generate a modulated power signal. The modulator may broadcast the message by sending the modulated power signal through the closed conductive loop. The modulated power signal, when passing through the closed conductive loop, may produce a modulated magnetic wave that includes an indication of the message. A receiver may be configured to detect the modulated magnetic wave from the closed conductive loop. The receiver may be configured to convert the modulated magnetic wave into the modulated power signal. The receiver may be configured to demodulate the modulated power signal to reproduce the message.
Abstract:
In some examples, data to be transmitted by a transmit node to at least one receive node may be compressed according to one or more sets of compression parameters. One or more estimated peak to average power ratios (PAPRs) to transmit one or more resulting versions of compressed data may be calculated based on precoder data associated with the at least one receive node. A version of the compressed data that has an estimated PAPR that is less than a PAPR threshold value may be sent to the transmit node to transmit to the at least one receive node. Alternately, a version of the compressed data that has an estimated PAPR that is a lowest estimated PAPR relative to at least some other estimated PAPRs corresponding to other versions of the compressed data may be sent to the transmit node to transmit to the at least one receive node.
Abstract:
In some examples, data to be transmitted by a transmit node to at least one receive node may be compressed according to one or more sets of compression parameters. One or more estimated peak to average power ratios (PAPRs) to transmit one or more resulting versions of compressed data may be calculated based on precoder data associated with the at least one receive node. A version of the compressed data that has an estimated PAPR that is less than a PAPR threshold value may be sent to the transmit node to transmit to the at least one receive node. Alternately, a version of the compressed data that has an estimated PAPR that is a lowest estimated PAPR relative to at least some other estimated PAPRs corresponding to other versions of the compressed data may be sent to the transmit node to transmit to the at least one receive node.
Abstract:
Technologies are generally described to adaptively sample merchant sites linked to payment transactions to gain insight into activities, interactions, and behaviors of visitors within the merchant site. In some examples, a payment network may define a virtual perimeter that represents an area of the merchant site in which to capture selected measurements. The virtual perimeter and measurements may be transmitted to a client application being executed or executing on a portable device associated with a visitor. The client application may capture the measurements and transmit the captured measurements as tracking data to the payment network upon detection of a presence of the portable device within the virtual perimeter. Payment data processed by the client application may also be transmitted to the payment network. The payment network may process the payment and tracking data to perform a business intelligence analysis associated with the merchant site.
Abstract:
Technologies are generally described to provide adaptable near field communication (NFC) in portable devices to enable a portable device to provide wireless power transfer (WPT) functionality and NFC functionality. According to some examples, a wireless power antenna installed on the portable device may be configured to function as a WPT antenna and as an NFC antenna. For example, the wireless power antenna may be a coil, which may be modified to adjust a quality factor (Q) by incorporation of a switchable resistor element. The modified coil may function as a wireless power receiver/transmitter with a high Q value when the resistor element is added and as an active NFC antenna with a low Q value when the resistor is not added. Additionally, the modified coil may further enable the portable device to function as a passive NFC antenna when the portable device is unpowered.
Abstract:
Technologies are directed to a detector to identify a side channel attack between virtual machines. According to some examples, an inter-processor interrupt (IPI) rate of a first virtual machine (VM), a time stamp counter (TSC) rate of a second VM, and a cache miss ratio (CMR) of a third VM may be monitored. A side channel attack may then be detected based on the IPI rate, the TSC rate, and the CMR.
Abstract:
Systems and methods to wirelessly transmit power are provided. A coil assembly is provided. In some examples, the coil assembly is configured to generate a signal in response to an ambient field, and to magnetically couple with a device to deliver power to the device.
Abstract:
Systems and methods to for wireless power transfer are provided. A transmit control module generates a sequence of resonant drive frequencies for a transmit coil. The transmit control module adjusts the resonant frequency of the transmit coil according to the sequence of resonant drive frequencies. A receive control module provides payment verification to the transmit control module and receives the sequence of resonant drive frequencies from the transmit control module in return. The receive control module adjusts a resonant frequency of a receive coil according to the sequence of resonant drive frequencies to match the resonant frequency of the transmit coil. The resonant frequencies of the transmit and receive coils change at the same time to maintain coupling and efficient power transfer.
Abstract:
Technologies are generally described for systems, devices and methods effective to identify an individual. In some examples, a microphone may receive sound data such as sound that may be present in a mall. A processor, that may be in communication with the microphone, may determine a name from the sound data. Stated differently, the processor may determine that the name is part of or included in the sound data. The processor may generate a query based on the name and may send the query to a social network database. The processor may receive a response to the query from the social network database and may identify the individual based on the response.
Abstract:
Technologies are directed to prevention of malicious attacks through cartography of co-processors at a datacenter. According to some examples, configuration data to create a co-processor at a field programmable gate array (FPGA) may be received at a configuration controller. The configuration controller may determine unused arrangements for the co-processor and unused placements at the FPGA corresponding to the unused arrangements. The used arrangements and the unused placements, associated with a type of the co-processor, may be stored in a configuration matrix. One of the unused arrangements and one of the unused placements corresponding to the selected unused arrangement may then be selected by the configuration controller to create the co-processor.