Abstract: Synchronizing ancillary data to content including audio includes obtaining a representation of the content's audio and ancillary data pegged to instants in the representation of the content's audio, and aligning the representation of the content's audio to the content's audio to synchronize the ancillary data pegged to the instants in the representation of the content's audio to the content.
Type:
Grant
Filed:
November 7, 2016
Date of Patent:
July 14, 2020
Assignee:
Source Digital, Inc.
Inventors:
Timothy J. Carroll, Henry Lawrence Frecon, III, Patrick Clay Greene, Michael Eric Phillips
Abstract: A bidirectional optical subassembly, an optical transceiver including the same, and methods of making and using the same are disclosed. The optical subassembly includes a photodiode configured to receive an incoming optical signal, a transmitter configured to transmit an outgoing optical signal, and a passive optical signal processing unit including a filter and a mirror. The filter is at a first predetermined angle relative to an optical path of the outgoing optical signal and is configured to (i) reflect one of the outgoing optical signal and the incoming optical signal and (ii) allow the other of the outgoing optical signal and the incoming optical signal to pass through. The mirror is configured to reflect the one of the outgoing optical signal and the incoming optical signal at a second predetermined angle. The first predetermined angle is adapted to reduce filter insertion losses.
Abstract: Apparatus and methodologies for cleaning a subterranean wellbore are provided. More specifically, a cleaning assembly and method of use is provided, the assembly being sealingly positioned within the wellbore and comprising a pump and a fluid control port for directing pressurized fluids downhole to clean the wellbore.
Abstract: A method for concealing original data to protect personal information is provided. The method includes steps of: a data obfuscation device (a) if the original data is acquired, inputting the original data or its modified data into a learning network, and allowing the learning network to (i) apply a network operation to the original data or the modified data using learned parameters of the learning network and thus to (ii) output characteristic information on the original data or the modified data; and (b) updating the original data or the modified data via backpropagation using part of (i) 1-st losses calculated by referring to the characteristic information and its corresponding 1-st ground truth, and (ii) 2-nd losses calculated by referring to (ii-1) a task specific output generated by using the characteristic information and (ii-2) a 2-nd ground truth corresponding to the task specific output, to thereby generate obfuscated data.
Abstract: A staple insertion device includes a staple drive chamber, staple reservoir, staple feed mechanism, and staple drive member. The staple drive chamber is formed between a backing plate and a jam plate removably attached to the backing plate. The staple reservoir is configured to receive and hold a plurality of staples and extends from the backing plate to a staple reservoir terminal plate. The staple feed mechanism is operatively connected to the staple reservoir and is configured to feed the plurality of staples from the staple reservoir into the staple drive chamber through the backing plate. The staple drive member is configured to advance downwardly through the staple drive chamber so as to drive a staple out of the staple drive chamber.
Abstract: A shallow speaker and a method of manufacture for the shallow speaker. The method of assembly uses two different alignment jigs at two different stages of the assembly to ensure alignment of the speaker components. During manufacture, a subassembly of components is created in the speaker frame, and then removed along with the first alignment jig. A second alignment jig is then placed in the speaker, and the bobbin and voice coil added. The subassembly is then connected to the frame, and the voice coil connected to the external connection terminal. Finally, the cone and dust cap are installed.
Abstract: Techniques are provided for shifting residential electric load from a utility power grid to a battery system during preconfigured hours of electric use. The apparatus includes a memory configured to store computer executable instructions, and a microprocessor in communication with the memory, the microprocessor configured to execute the instructions to cause the apparatus to shift residential electric load from the utility power grid to the battery system for a first time period during a first calendar period of a calendar year, and to shift residential electric load from the utility power grid to the battery system for a second time period during a second calendar period of the calendar year.
Abstract: A system and a method of detection of an attack on a computer network including a plurality of nodes, the method including: associating the plurality of nodes with each other in a distributed ledger configuration; producing, by a requesting node of the plurality of nodes, a request to set a value of at least one key derivation parameter; performing a vote of confidence among a subset of the plurality of nodes regarding the validity of the request; and detecting an attack on at least one node of a plurality of nodes according to the vote of confidence.
Abstract: A dual-use footrest is disclosed. The dual-use footrest comprises a bottom frame and a flip frame. The bottom frame includes a shaft part disposed at a side of the two side plates, and a support disposed a side of the shaft part, and the flip frame includes a shaft coupling part disposed at a side of the two side frames and pivotally connected to the shaft part, and a pedal part disposed on a side of the shaft coupling part. When the back surface of the flip frame is abutted on the bottom frame, the user with the sitting posture can step on the pedal part; and, when the flip frame is outwardly flipped about the shaft coupling part and the shaft part, to abut on the support of the bottom frame by the top surface thereof, the user with the standing posture can step on the footrest.
Abstract: A method for learning an obfuscation network used for concealing original data is provided. The method includes steps of: a learning device instructing the obfuscation network to obfuscate inputted training data, inputting the obfuscated training data into a learning network, and allowing the learning network to apply a network operation to the obfuscated training data and thus to generate 1-st characteristic information, and allowing the learning network to apply a network operation to the inputted training data and thus to generate 2-nd characteristic information, and learning the obfuscation network such that an error is minimized, calculated by referring to part of an error acquired by referring to the 1-st and the 2-nd characteristic information, and an error acquired by referring to a task specific output and its corresponding ground truth, and such that an error is maximized, calculated by referring to the training data and the obfuscated training data.
Abstract: A system includes simulated virtual users that are generated to register for personal email accounts. The virtual users are generated using behavior, demographic, and sociographic profiles. The email accounts receive and interact with email using a server and a simulator according to profile data for the simulated virtual users. The interactions are monitored to determine and simulate deliverability and other information for the personal email accounts. Further, the server and simulator are specific to a certain country or location to act as users in those locations.
Abstract: A method for learning a user learning network to recognize obfuscated data created by concealing original data is provided. The method includes steps of: a 2-nd learning device, (a) on condition that a 1-st learning device has performed (i) instructing the obfuscation network to generate obfuscated training data, (ii) inputting (ii-1) the obfuscated training data into, to generate 1-st characteristic information for training, and (ii-2) the training data, to generate 2-nd characteristic information for training, into a learning network for training and (iii) learning the obfuscation network, and acquiring (i) the obfuscated training data and a training data GT, or (ii) obfuscated test data and a test data GT; (b) inputting (i) the obfuscated training data, to generate 3-rd characteristic information for training, or (ii) the obfuscated test data, to generate 4-th characteristic information for training, into the user learning network; and (c) learning the user learning network.
Abstract: A method for learning an adaption network corresponding to an obfuscation network used for concealing original data is provided. The method includes steps of: (a) on condition that a 1-st learning device has performed or is performing processes of (i) instructing the obfuscation network to obfuscate the training data to generate obfuscated training data, (ii) inputting the obfuscated training data into a learning network to generate 1-st characteristic information for training and inputting the training data into the learning network to generate 2-nd characteristic information for training, and (iii) learning the obfuscation network, a 2-nd learning device performing one of inputting the training data into the adaption network to generate 1-st feature adapted data and inputting test data into the adaption network to generate 2-nd feature adapted data and one of (i) acquiring a 1-st adaption ground truth and learning the adaption network and (ii) learning the adaption network.
Abstract: A method for learning a data embedding network is provided. The method includes steps of: a learning device acquiring and inputting original training data and mark training data into the data embedding network which integrates them and generates marked training data; inputting the marked training data into a learning network which applies a network operation to them and generates 1-st characteristic information, and inputting the original training data into the learning network which applies a network operation to them and generates 2-nd characteristic information; learning the data embedding network such that a data error is minimized, by referring to part of errors referring to the 1-st and the 2-nd characteristic information and errors referring to task specific outputs and their ground truths, and a marked data score is maximized, and learning a discriminator such that a original data score is maximized and the marked data score is minimized.
Abstract: A pumping system and a method operative to utilize at least two downhole pump assemblies to produce hydrocarbons from at least two locations of a subterranean reservoir, wherein the pump assemblies are controllably adjusted to synergistically provide uniform draw down from the wellbore.
Abstract: An adjustable screen lift arm includes a support frame assembly with a frame base, a balance adjustment mechanism including a gear set consisting a drive gear and a sector-like driven gear, a gear rack meshed with the drive gear and a spring connected between the frame base and the driven gear, and a holder block assembly has a holder block body that combined with the gear rack and a first sliding rail, the other side combined with a second sliding rail. When the holder block body is moved vertically, the gear rack rotates the drive gear, causing the driven gear to stretch or compress the spring so that the arm of force is relatively changed to offset the spring force of the spring, enabling the holder block assembly to be freely adjusted to the desired elevation and then automatically positioned.
Abstract: Embodiments of the disclosure pertain to an electromagnetic interference shielding device comprising a base plate, first and second lateral plates connected and oriented orthogonally to the base plate, and at least one top plate connected to and oriented orthogonally to the first and second lateral plates, and a method of manufacturing such an electromagnetic interference shielding device. The top plate(s) further include (i) first and second front or side bends extending toward the base plate from a first side of the top plate(s) and (ii) first and second rear bends extending toward the base plate from a second side of the top plates. The second side of the top plate(s) is different from the first side.
Abstract: A WDM multiplexing/demultiplexing system includes a de-multiplexer configured to separate and guide light beams from an incident ray having a plurality of wavelengths to corresponding lenses on an optical device, a multiplexer configured to guide light beams from optical transmitters having various wavelengths through the corresponding lenses on the optical device and combine the light beams, a lens array including the corresponding lenses to receive and/or transmit the light beams from or to the de-multiplexer and multiplexer, and a light beam collimator configured to function with the multiplexer and de-multiplexer. The light beams received or transmitted by the light beam collimator and the light beams transmitted or received from or to the multiplexer and de-multiplexer are collinear. The light beam collimator and multiplexer/de-multiplexer can be easily positioned to predetermined or designed positions, thereby providing light beams output through the lenses in a plastic optical device.