Abstract:
Suppressing one or more frequency ranges of a signal prevents the occurrence of feedback in a voice data communications application. A system recognizes a frequency range in a signal where feedback occurs, or anticipates a frequency range where feedback is anticipated. The signal includes a signal the input system generates or that the output system renders. The system suppresses the signal in the frequency range by disregarding one or more sampling bits representing the frequency range, or by applying one or more filters to attenuate or eliminate the signal in the frequency range. The system may monitor the signal to identify feedback resulting in different or additional frequency ranges and suppress the signal in the different or additional frequency ranges to prevent feedback from occurring.
Abstract:
Suppressing one or more frequency ranges of a signal prevents the occurrence of feedback in a voice data communications application. A system recognizes a frequency range in a signal where feedback occurs, or anticipates a frequency range where feedback is anticipated. The signal includes a signal the input system generates or that the output system renders. The system suppresses the signal in the frequency range by disregarding one or more sampling bits representing the frequency range, or by applying one or more filters to attenuate or eliminate the signal in the frequency range. The system may monitor the signal to identify feedback resulting in different or additional frequency ranges and suppress the signal in the different or additional frequency ranges to prevent feedback from occurring.
Abstract:
Systems, methods, and/or techniques (“tools”) are described that sort speakers in a network-enabled conference. In some cases, this sorted list of speakers indicates which speaker is dominant. With this sorted list, a participant's communication device may provide context about the speakers. In some cases a participant's communication device has a display that presents real-time video of the speakers or other visual indicia, such as each or the most dominant speaker's name, picture, title, or location. These and other context about speakers may help participants better understand discussions in network-enabled conferences.
Abstract:
FIG. 1 is a perspective view of a canopy pole showing the claimed design; FIG. 2 is another perspective view of a canopy pole showing the claimed design; FIG. 3 is a front elevational view thereof; FIG. 4 is a top plan view thereof; FIG. 5 is a bottom plan view thereof; FIG. 6 is a partial enlarged view of an area labeled 6 in FIG. 1; FIG. 7 is the second enlarged view of an area labeled 7 in FIG. 2; and, FIG. 8 is the third enlarged view of an area labeled 8 in FIG. 2. The broken lines illustrate portions of the canopy pole that form no part of the claimed design. The dash-dot broken lines in FIGS. 1, 2 and 6-8 are included to show enlarged partial views. All other broken lines represent portions of the canopy pole that form no part of the claimed design. None of the broken lines form a part of the claim.
Abstract:
A disparity value deriving device includes a calculator configured to calculate costs of candidates for a corresponding region in a comparison image that corresponds to a reference region in a reference image, based on luminance values of the regions. The device also includes a changer configured to change a cost exceeding a threshold to a value higher than the threshold; a synthesizer configured to synthesize a cost of a candidate for a corresponding region for one reference region after the change and a cost of a candidate for a corresponding region for another reference region after the change; and a deriving unit configured to derive a disparity value based on a position of the one reference region and a position of the corresponding region in the comparison image for which the cost after the synthesis is smallest.
Abstract:
Membership information for participating computer systems participating in a multi-party conferencing session is distributed by intermittently exchanging link databases with one or more neighbor computer systems. A link database includes one or more link state records, each link state record identifying a participating computer systems and a list of neighbor computer systems that are logically linked to the participating computer system. When a new computer system joins or a participating computer system leaves the multi-party session this joining or leaving change is reflected in the link databases of corresponding neighbor computer systems. As the neighbor computer systems exchange link databases, the change is eventually propagated to all the participating computer systems. Accordingly, participant computer systems continually transition towards a steady state where each participant computer system is aware of other participant computer systems and logical links associated with other participant computer systems.
Abstract:
A technique for reducing information reception delays is provided. The technique reduces delays that may be caused by protocols that guarantee order and delivery, such as TCP/IP. The technique creates multiple connections between a sender and recipient computing devices and sends messages from the sender to the recipient on the multiple corrections redundantly. The recipient can then use the first arriving message and ignore the subsequently arriving redundant messages. The recipient can also wait for a period of time before determining which of the arrived messages to use. The technique may dynamically add connections if messages are not consistently received in a timely manner on multiple connections. Conversely, the technique may remove connections if messages are consistently received in a timely manner on multiple connections. The technique can accordingly be used with applications that are intolerant of data reception delays such as Voice over IP, real-time streaming audio, or real-time streaming video.
Abstract:
A technique for reducing information reception delays is provided. The technique reduces delays that may be caused by protocols that guarantee order and delivery, such as TCP/IP. The technique creates multiple connections between a sender and recipient computing devices and sends messages from the sender to the recipient on the multiple corrections redundantly. The recipient can then use the first arriving message and ignore the subsequently arriving redundant messages. The recipient can also wait for a period of time before determining which of the arrived messages to use. The technique may dynamically add connections if messages are not consistently received in a timely manner on multiple connections. Conversely, the technique may remove connections if messages are consistently received in a timely manner on multiple connections. The technique can accordingly be used with applications that are intolerant of data reception delays such as Voice over IP, real-time streaming audio, or real-time streaming video.
Abstract:
A method of fabricating bulk superconducting material such as RBa.sub.2 Cu.sub.3 O.sub.7-.delta. where R is La or Y comprising depositing a thin epitaxially oriented film of Nd or Sm (123) on an oxide substrate. The powder oxides of RBa.sub.2 Cu.sub.3 O.sub.7-.delta. or oxides and/or carbonates of R and Ba and Cu present in mole ratios to form RBa.sub.2 Cu.sub.3 O.sub.7-.delta., where R is Y or La are heated, in physical contact with the thin film of Nd or Sm (123) on the oxide substrate to a temperature sufficient to form a liquid phase in the oxide or carbonate mixture while maintaining the thin film solid to grow a large single domain 123 superconducting material. Then the material is cooled. The thin film is between 200 .ANG. and 2000 .ANG.. A construction prepared by the method is also disclosed.
Abstract:
The present invention discloses substituted 1-(3,3-difluoropiperidin-4-yl)-8-(pyridin-3-yl)-1,3-dihydro-2H-imidazo[4,5-c]quinolin-2-one compounds having a capacity to cross the blood-brain barrier; the compound has the structural formula represented by formula (I):
The substituted 1-(3,3-difluoropiperidin-4-yl)-8-(pyridin-3-yl)-1,3-dihydro-2H-imidazo[4,5-c]quinolin-2-one compounds, derivatives and pharmaceutically acceptable salts thereof of the present invention have the ability to cross the blood-brain barrier and are capable of acting as a drug characteristic of a protein kinase inhibitor, in particular for the expression of a protein through an Ataxia-telangiectasia mutated kinase (ATM) and can be used to treat or prevent disorders associated with abnormal protein kinase activity, such as cancer, cancer with brain metastases, cancer with meningeal metastases, glioma, glioblastoma, DIPG, and the like either as monotherapy or combination with other treatment.