Abstract: A continuously variable diaphragm or swappable fixed aperture for use in thermal infrared cameras, which aperture or diaphragm can be cooled to cryogenic temperatures. The invention contemplates mounting aperture control means, if necessary, in a vacuum or extending the control mechanism through a vacuum in a thermally isolated manner to avoid radiation load on the photocell. The inventive method implements such a diaphragm and control system. The invention makes possible the object of using a single thermal infrared camera under a wide variety of target-scene radiation conditions that may be rapidly changing, with interchangeable or zoom camera lenses requiring matching or different size cold stops, and under other such dynamic situations.
Abstract: The invention is an instruction presentation apparatus adapted to present a series of instruction screen displays to a user according to a predetermined sequence. Each instruction screen display includes both textual information describing the work to be done during execution of an instruction and graphical information correlated with the textual information graphically illustrating the machine that is worked on during execution of the instruction. The apparatus is configured to withhold display of a next instruction screen display in a series of instruction screen displays until the apparatus receives a user initiated command to display a next instruction screen display.
Type:
Grant
Filed:
October 26, 1999
Date of Patent:
June 15, 2004
Assignee:
Red Oak Knowledge Systems, Inc.
Inventors:
Mark B. Steigerwald, Jeffrey J. Steigerwald, J. Scott Buehler
Abstract: A plurality of mappings of each keyword of a plurality of keywords contained in a set of terms to one or more related keywords of a plurality of related keywords in the set of terms is created. One or more mappings from the plurality of mappings is selected based on a set of parameters. Finally, the selected mappings are processed to obtain one or more search expressions.
Type:
Grant
Filed:
October 31, 2000
Date of Patent:
March 23, 2004
Assignee:
Tacit Knowledge Systems, Inc.
Inventors:
Jonathan Michael Goldberg, Hernan Epelman-Wang
Abstract: A search is refined, where a user enters a keyword, and a database comprising terms is searched for terms comprising the keyword. Every unique member in the terms is assigned an importance value to produce a set of discriminator members. The discriminator members are presented to the user, and the user may select one or more of the discriminator members to refine the search. If the user selects any keywords, a new keyword is created using the original keyword and the selected discriminator members. A new search is conducted based on the new keyword.
Abstract: A method of authorizing a user profile access request includes the step of detecting the access request from an inquiring user to access a user profile of a target user. Responsive to the detected access request, an authorization request is automatically generated and sent to the target user. In response to the authorization request, the target user may then authorize access to his or her user profile by the inquiring user. Of course, the target user may also decline access to the relevant user profile.
Abstract: An agent in a knowledge management system automatically manages profile terms in a user profile by selecting certain terms in a private portion of the user profile and moving the selected terms to a public portion of the profile. Additionally, the selected terms can be further filtered to determine which will be moved. The owner of the user profile also may specify whether a particular term is always moved, never moved, or moved only when the user is alerted that the term is selected and the owner chooses to move the term.
Type:
Grant
Filed:
October 25, 2000
Date of Patent:
October 28, 2003
Assignee:
Tacit Knowledge Systems, Inc.
Inventors:
David L. Gilmour, Hernan Epelman-Wang, Jonathan M. Goldberg, Richard Sanders, Eric Wang
Abstract: A method of constructing an entity profile, having private and public portions with different access restrictions, commences with the assignment of a confidence level to content within an electronic document. The electronic document may be associated with the first entity (e.g., may have been authored by or addressed to the first entity). The content may furthermore potentially be descriptive of the first entity. If the confidence level assigned to the content is less than a predetermined threshold, the content is automatically rejected for inclusion within the entity profile. On the other hand, if the confidence level assigned to the content exceeds the predetermined threshold, the content is included within the private portion of the entity profile. Thereafter, the content is automatically presented to the first entity for authorization, by the first entity, for inclusion of the content within the public portion of the profile.
Abstract: A method of constructing an entity profile, having private and public portions with different access restrictions, commences with the assignment of a confidence level to content within an electronic document. The electronic document may be associated with the first entity (e.g., may have been authored by or addressed to the first entity). The content may furthermore potentially be descriptive of the first entity. If the confidence level assigned to the content is less than a predetermined threshold, the content is automatically rejected for inclusion within the entity profile. On the other hand, if the confidence level assigned to the content exceeds the predetermined threshold, the content is included within the private portion of the entity profile. Thereafter, the content is automatically presented to the first entity for authorization, by the first entity, for inclusion of the content within the public portion of the profile.
Abstract: A method of authorizing a user profile access request includes the step of detecting the access request from an inquiring user to access a user profile of a target user. Responsive to the detected access request, an authorization request is automatically generated and sent to the target user. In response to the authorization request, the target user may then authorize access to his or her user profile by the inquiring user. Of course, the target user may also decline access to the relevant user profile.
Abstract: A method of constructing a profile comprising terms indicative of a characteristic of an entity commences when first electronic mail address, associated with a first entity, is created within a knowledge management system. The electronic mail address may be created automatically upon submission of an electronic mail document, or may be created manually by a systems administrator. A first electronic document is received via an electronic communications network at the first electronic mail address from a second entity, typically a user of the knowledge management system who is a registered and interactive user. The first electronic document is then parsed to identify profile terms therein. These profile terms are included within a first profile for the first entity. In this way, users of a knowledge management system may construct a profile of an entity (e.g., a customer) that is not a user of or participant within the knowledge management system.
Abstract: A method of assigning a confidence level to a term within an electronic document, such as an e-mail, includes the step of firstly determining a quantitative indicator in the exemplary form of an occurrence value, based on the number of occurrences of a particular term within an electronic document, and associating the occurrence term within the relevant term. Thereafter, a qualitative indicator, based on a quality of the term, is determined. For example, the qualitative indicator may be determined utilizing the parts of speech of words comprising the term. A confidence level value, which may be utilized to indicate a relative importance of the term in describing a user knowledge base, is then generated utilizing the quantitative and qualitative indicators.
Abstract: A method of authorizing a user profile access request includes the step of detecting the access request from an inquiring user to access a user profile of a target user. Responsive to the detected access request, an authorization request is automatically generated and sent to the target user. In response to the authorization request, the target user may then authorize access to his or her user profile by the inquiring user. Of course, the target user may also decline access to the relevant user profile.
Abstract: A method of querying a user profile commences with a first access to a public portion of a knowledge profile for each of a plurality of potential targets of the electronic document, the public portion of each knowledge profile including public knowledge terms indicative of a knowledge base of a potential target of the electronic document. The first access is responsive to a first query received from an originator. A first matching operation is performed between a document term within the electronic document and public knowledge terms within the public portion of each knowledge profile to identify a first set of targets for which a match exists between the document term and at least one public knowledge term. The first set of targets is published to the originator.
Abstract: A method of constructing a user knowledge profile, having distinct public and private portions with different access restrictions, requires assigning a confidence level to content within an electronic document. The electronic document is associated with a user, such as for example the author of the document. The content may be potentially indicative of a knowledge base of the user. The content is then stored in either the public or private portion of the user knowledge profile dependent upon whether the confidence level exceeds, or falls below, a predetermined threshold level. The public portion of the user knowledge profile is freely accessible by third parties, whereas the private portion has restricted access.