Patents by Inventor Xiaoyang FU
Xiaoyang FU has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11977334Abstract: A method for determining a wavefront parameter of a patterning process. The method includes obtaining a reference performance (e.g., a contour, EPE, CD) of a reference apparatus (e.g., a scanner), a lens model for a patterning apparatus configured to convert a wavefront parameter of a wavefront to actuator movement, and a lens fingerprint of a tuning apparatus (e.g., a to-be-matched scanner). Further, the method involves determining the wavefront parameter (e.g., a wavefront parameter such as tilt, offset, etc.) based on the lens fingerprint of the tuning apparatus, the lens model, and a cost function, wherein the cost function is a difference between the reference performance and a tuning apparatus performance.Type: GrantFiled: December 28, 2022Date of Patent: May 7, 2024Assignee: ASML NETHERLANDS B.V.Inventors: Duan-Fu Stephen Hsu, Christoph Rene Konrad Cebulla Hennerkes, Rafael C. Howell, Zhan Shi, Xiaoyang Jason Li, Frank Staals
-
Publication number: 20240146608Abstract: In implementations of the present disclosure, there is provided a method for access point (AP) validation. The method comprises detecting a trigger event for validating a network including a plurality of APs, and selecting a target AP from the plurality of APs based on a neighbor table of an AP associated with the detected trigger event. The method further comprises determining a validation case corresponding to the detected trigger event from a knowledge base. The method further comprises sending the validation case to the target AP, and, receiving a result of performance of the validation case from the target AP in response to the validation case being performed. Implementations of the present disclosure can validate whether the network change takes effect in the network automatically, and can improve the validation efficiency of the network changes.Type: ApplicationFiled: October 28, 2022Publication date: May 2, 2024Inventors: Junyu PEI, Xiaohang WEI, Xiaoyang FU, Kangchang HUANG
-
Publication number: 20240119212Abstract: Methods for configuring a patterning process based on results of another patterning process is described. The method includes obtaining a first set of contours by simulating a first patterning process using a design layout in a first orientation. The contours satisfy a design specification associated with the design layout and correspond to a first set of process window conditions. A second patterning process is configured based on a second orientation of the design layout, the first set of process window conditions and the first set of contours. The second patterning process is associated with one or more design variables (e.g., illumination, mask pattern) that affect a second set of contours. The configuring includes adjusting one or more design variables until the second set of contours are within a desired matching threshold with the first set of contours.Type: ApplicationFiled: February 25, 2022Publication date: April 11, 2024Applicant: ASML NETHERLANDS B.V.Inventors: Jung Hoon SER, Sungwoon PARK, Xin LEI, Jinwoong JEONG, Rongkuo ZHAO, Duan-Fu Stephen HSU, Xiaoyang LI
-
Publication number: 20230388896Abstract: Systems and methods are provided for a computing system for managing a mesh network deployment that includes a memory storing machine-executable instructions, and a processor configured to access the memory and execute the machine executable instructions to receive, link performance measurements from a plurality of access points in a mesh network, and determining a topology of the mesh network by: determining a first node competition index (NCI) for each interfering access point of the plurality of access points in the mesh network; comparing the NCI for each interfering access point to determine a maximum transmission time for each mesh link; and altering the network topology by assigning an active or backup mesh link to each access point based on the maximum transmission time for each mesh link.Type: ApplicationFiled: May 31, 2022Publication date: November 30, 2023Inventors: XIONG ZHANG, Xiaoyang Fu, Kangchang Huang
-
Patent number: 11805571Abstract: In embodiments of the present disclosure, a method is provided for managing a mesh point. A request is transmitted from a mesh point to a mesh portal, and the request indicates that Reduced Neighbor Report (RNR) information is required. A beacon with the RNR information is received from the mesh portal. A mesh link is established with a target mesh portal based on the beacon with the RNR information. Therefore, the time cost and the data communication of a scanning procedure of the mesh point may be greatly reduced. Further, communications in the scanning procedure are lowered, such that conflicts in the air may be alleviated.Type: GrantFiled: April 29, 2021Date of Patent: October 31, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Xiaoyang Fu, Xuguang Jia, Qiang Zhou
-
Patent number: 11750375Abstract: Disclosed are an encryption and decryption method and device based on bit permutation and bit transformation. The method includes: configuring a memory space, and preparing corresponding storage spaces for a plaintext file, a ciphertext file and a key file; changing a bit value of an initial key stream according to a bit operation rule, so as to obtain a bit-transformed key stream, changing a bit value of a plaintext according to the bit operation rule depending on the key stream; on the basis of a bit-transformed plaintext stream, according to a bit permutation rule depending on the key stream, performing a bit permutation operation on the bit-transformed plaintext stream, and randomly distributing the plaintext stream in a ciphertext stream, so as to obtain a target ciphertext and store the same as a file.Type: GrantFiled: April 19, 2019Date of Patent: September 5, 2023Assignees: Zhuhai College of Science And Technology, Jilin UniversityInventors: Yujuan Si, Guanghui Feng, Liuqi Lang, Xiaoyang Fu, Hao Wu
-
Publication number: 20230125405Abstract: Implementations of the present disclosure relate to automatic AP failure recovery with assistance of a neighbor AP. A method includes detecting, by a first access point (AP), a failure at the first AP. The method further includes transmitting, by the first AP to a second AP, a query about an operating status of the second AP. The first AP then receives, from the second AP, a response to the query, the response indicating the operating status of the second AP. The method also includes determining, by the first AP and based at least in part on the operating status of the second AP, that the failure is not indicative of an event also impacting the second AP. The method further includes utilizing, by the first AP, the second AP to assist with recovery from the failure.Type: ApplicationFiled: October 6, 2021Publication date: April 27, 2023Inventors: Junyu PEI, Xiaohang WEI, Pengfei JIN, Xiaoyang FU, Kangchang HUANG
-
Publication number: 20220353953Abstract: In embodiments of the present disclosure, a method is provided for managing a mesh point. A request is transmitted from a mesh point to a mesh portal, and the request indicates that Reduced Neighbor Report (RNR) information is required. A beacon with the RNR information is received from the mesh portal. A mesh link is established with a target mesh portal based on the beacon with the RNR information. Therefore, the time cost and the data communication of a scanning procedure of the mesh point may be greatly reduced. Further, communications in the scanning procedure are lowered, such that conflicts in the air may be alleviated.Type: ApplicationFiled: April 29, 2021Publication date: November 3, 2022Inventors: Xiaoyang FU, Xuguang JIA, Qiang ZHOU
-
Patent number: 11405275Abstract: An example device comprising: a processor to determine whether an uplink of the network device in a mesh network is operational, to determine whether a host is reachable through the uplink in response to the uplink being operational, and to periodically determine a mesh network role of the network device based on the determination of whether the host is reachable through the uplink.Type: GrantFiled: March 18, 2019Date of Patent: August 2, 2022Assignee: Hewlett Packard Enterprise Development LPInventors: Kangchang Huang, Xiaoyang Fu, Xuefu Wang
-
Publication number: 20220225231Abstract: In embodiments of the present disclosure, there is provided an approach for power saving in a mesh network. According to embodiments of the present disclosure, a mesh portal transmits, to a mesh point in a sleep mode, a packet for waking up the mesh point during a predetermined time period. The mesh point in the sleep mode detects the packet during the predetermined time period. In accordance with a determination that the mesh point is waked up, the mesh portal establishes a mesh link with the mesh point. Embodiments of the present disclosure provide an effective way for power saving in a mesh network.Type: ApplicationFiled: January 11, 2021Publication date: July 14, 2022Inventors: Junyu PEI, Xuguang JIA, Xiaoyang FU
-
Publication number: 20220150054Abstract: Disclosed are an encryption and decryption method and device based on bit permutation and bit transformation. The method includes: configuring a memory space, and preparing corresponding storage spaces for a plaintext file, a ciphertext file and a key file; changing a bit value of an initial key stream according to a bit operation rule, so as to obtain a bit-transformed key stream, changing a bit value of a plaintext according to the bit operation rule depending on the key stream; on the basis of a bit-transformed plaintext stream, according to a bit permutation rule depending on the key stream, performing a bit permutation operation on the bit-transformed plaintext stream, and randomly distributing the plaintext stream in a ciphertext stream, so as to obtain a target ciphertext and store the same as a file.Type: ApplicationFiled: April 19, 2019Publication date: May 12, 2022Applicants: Zhuhai College of Science And Technology, Jilin UniversityInventors: Yujuan Si, Guanghui Feng, Liuqi Lang, Xiaoyang Fu, Hao Wu
-
Publication number: 20220109566Abstract: Disclosed are an encryption and decryption method and device based on a random hash and bit operation. The method includes the steps of: S1: configuring a memory space, and preparing corresponding storage spaces for a plaintext file, a ciphertext file, and a key file, wherein the key file comes from an existing coding sequence and serves as a shared file for encryption and decryption; S2: providing a reversible hash function set used for encryption and decryption, and then uniformly scattering the plaintext in a known binary random hash by an encryption hash function; and S3: introducing a bit operation rule set, changing values of all or partial binary bits of the binary random hash by a bit operation, and mapping the values to a ciphertext space. The device includes a memory and a processor, and is configured to implement the above method.Type: ApplicationFiled: April 19, 2019Publication date: April 7, 2022Applicants: Jilin University, Zhuhai College of Science And TechnologyInventors: Yujuan SI, Guanghui FENG, Liuqi LANG, Xiaoyang FU, Hao WU
-
Publication number: 20190334772Abstract: An example device comprising: a processor to determine whether an uplink of the network device in a mesh network is operational, to determine whether a host is reachable through the uplink in response to the uplink being operational, and to periodically determine a mesh network role of the network device based on the determination of whether the host is reachable through the uplink.Type: ApplicationFiled: March 18, 2019Publication date: October 31, 2019Inventors: Kangchang HUANG, Xiaoyang FU, Xuefu WANG