Patents by Inventor Chun Ling Li
Chun Ling Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240153068Abstract: A non-contact detection method for a nut is provided. The method includes the following steps. The nut is photographed to obtain a threaded hole image of the nut. A thread area comparison between the threaded hole image and a standard threaded hole image is performed. An area difference is obtained according to the result of the thread area comparison. Whether the nut is a good nut is determined according to the area difference.Type: ApplicationFiled: January 6, 2023Publication date: May 9, 2024Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Wei-Shiang HUANG, Tsai-Ling KAO, Chun-Yi LEE, Jhe-Ruei LI
-
Patent number: 11916314Abstract: A mobile device includes a housing, a first radiation element, a second radiation element, a third radiation element, a first switch element, and a second switch element. The first radiation element has a first feeding point. The second radiation element has a second feeding point. The first radiation element, the second radiation element, and the third radiation element are distributed over the housing. The first switch element is closed or open, so as to selectively couple the first radiation element to the third radiation element. The second switch element is closed or open, so as to selectively couple the second radiation element to the third radiation element. An antenna structure is formed by the first radiation element, the second radiation element, and the third radiation element.Type: GrantFiled: May 12, 2022Date of Patent: February 27, 2024Assignee: HTC CorporationInventors: Cheng-Hung Lin, Szu-Po Wang, Chia-Te Chien, Chun-Chieh Wang, Kang-Ling Li, Chun-Hsien Lee, Yu-Chieh Chiu
-
Publication number: 20230361997Abstract: Computer technology for combining an encryption / decryption (e/d) key with additional information to obtain a specialized e/d key. The additional information one or more of the following types of additional information: client UUID (universally unique identifier), FQDN (fully qualified domain name), database hardware information, data physical position on the hard disk and/or stored data creation date. By combining the basic key with these kind(s) of operational information and/or software / hardware identifier information, the security of the underlying encrypted data can be meaningfully enhanced.Type: ApplicationFiled: May 5, 2022Publication date: November 9, 2023Inventors: Peng Hui Jiang, XI QING ZHANG, Ming Zhe Jiang, Mu Chen, CHUN LING LI
-
Publication number: 20230305950Abstract: A computer-implemented method according to one embodiment includes updating code segments of source code to include predetermined code pieces. The updated code segments are configured to output information about associated test cases upon the test cases being run. The method further includes running the test cases, and subsequent to a change being made to the source code, determining a prioritized subset of the test cases. The prioritized subset of the test cases is run. A computer program product according to another embodiment includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method.Type: ApplicationFiled: March 22, 2022Publication date: September 28, 2023Inventors: Chun Ling Li, Heng Wang, Jing Chen, Zhi Dan Hao, Wei Jiang, Cheng Fang Wang, Xiao Ling Chen
-
Patent number: 11290541Abstract: A method, system, and computer program product may generate synchronous application logs. A client device may create a session with a server, and the client device may be granted privileges to receive a backend service log associated with the session. A socket accompanying the session may be created between the client and server for communicating the backend service log. The requests from the client device may be monitored at the server, and log information related to the requests may be extracted by the backend service associated with the backend service log. The extracted log information may be transferred, via the socket, to the client device.Type: GrantFiled: March 19, 2019Date of Patent: March 29, 2022Assignee: International Business Machines CorporationInventors: Zhi Gang Lin, Li Xiang, Peng Chang, Chun Ling Li, Dan Li, Xiao Feng Zhang, Mu Chen
-
Patent number: 11249880Abstract: In an approach for debugging and simulating application runtime execution, a processor loads source code and logs into a debug tool. A processor generates log debug information including a log map, a log variable cross reference table, and a method call stack tree. A processor determines a plurality of log blocks based on log context in the logs and the method call stack tree. A processor maps the source code to the logs for each log block. A processor suggests a starting point and a breakpoint based on the log variable cross reference table and the log blocks. A processor compares a source code variable value to a log variable value and a source code execution path to a log execution path based on the mapping set between the source code and the logs. A processor simulates the source code variable value with the log variable value.Type: GrantFiled: June 14, 2021Date of Patent: February 15, 2022Assignee: International Business Machines CorporationInventors: Chun Ling Li, Jing Chen, Wei Jiang, Xiaopeng Zhang, Yun Wang, Zhen Liu
-
Publication number: 20200304577Abstract: A method, system, and computer program product may generate synchronous application logs. A client device may create a session with a server, and the client device may be granted privileges to receive a backend service log associated with the session. A socket accompanying the session may be created between the client and server for communicating the backend service log. The requests from the client device may be monitored at the server, and log information related to the requests may be extracted by the backend service associated with the backend service log. The extracted log information may be transferred, via the socket, to the client device.Type: ApplicationFiled: March 19, 2019Publication date: September 24, 2020Inventors: Zhi Gang Lin, Li Xiang, Peng Chang, Chun Ling Li, Dan Li, Xiao Feng Zhang, Mu Chen
-
Patent number: 9852045Abstract: Embodiments for debugging program code are provided. In response to a debug comparison request, (i) a first set of debugging operations are initiated on a first portion of program code selected from an original version of a program, and (ii) a second set of debugging operations are initiated on a second portion of program code selected from a revised version of the program. The second portion of program code corresponds to the first portion of program code. Execution of the first and second portions of program code is synchronized. The first and second set of debugging operations are stopped in response to determine that at least one of a first and a second stop condition exists based, at least in part, on a comparison of the results from executing one or more lines of corresponding code from the first and second portions of program code.Type: GrantFiled: October 13, 2015Date of Patent: December 26, 2017Assignee: International Business Machines CorporationInventors: Peng Chang, Chun Ling Li, ZhiGang Lin, Nan Shi, Xiao Feng Zhang
-
Publication number: 20170103010Abstract: Embodiments for debugging program code are provided. In response to a debug comparison request, (i) a first set of debugging operations are initiated on a first portion of program code that is selected from an original version of a program, and (ii) a second set of debugging operations are initiated on a second portion of program code that is selected from a revised version of the program. The second portion of program code corresponds to the first portion of program code. Execution of the first and second portions of program code is synchronized. The first and second set of debugging operations are stopped in response to determine that at least one of a first and a second stop condition exists based, at least in part, on a comparison of the results from executing one or more lines of corresponding code from the first and second portions of program code.Type: ApplicationFiled: October 13, 2015Publication date: April 13, 2017Inventors: Peng Chang, Chun Ling Li, ZhiGang Lin, Nan Shi, Xiao Feng Zhang