Patents by Inventor Wenchao Zhou
Wenchao Zhou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11235523Abstract: A 3D printer comprising a pump, stepper motor adapted to drive the pump and a printing arm connected to a curing source and nozzle.Type: GrantFiled: September 25, 2019Date of Patent: February 1, 2022Assignee: Board of Trustees of the University of ArkansasInventors: Casey Trent Lindbloom, Wenchao Zhou
-
Publication number: 20210402298Abstract: A method and apparatus for controlling a virtual camera in a game are disclosed. In the present application, a virtual camera is controlled to shift in response to a first touch operation for a visual field control region, and the virtual camera is controlled to enter a locked state according to a locking operation, thereby locking a game scene captured by the shifted virtual camera as a game scene rendered on a graphical user interface until restoring to control the movement of the virtual camera according to the position change of a virtual character when the locked state is unlocked.Type: ApplicationFiled: April 12, 2019Publication date: December 30, 2021Inventors: Wenchao ZHOU, Kun SHAO
-
Publication number: 20210362056Abstract: A method and apparatus for controlling a virtual camera in a game are disclosed. In the present disclosure, it is detected whether a movement of a virtual character toward a first direction satisfies a preset condition, when the preset condition is satisfied, a shifting direction of the virtual camera is determined, and the virtual camera is controlled to shift toward the shifting direction while moving according to a change of position of the virtual character, thereby a game scene image captured by the shifted virtual camera is displayed on a Graphical User Interface (GUI).Type: ApplicationFiled: May 15, 2019Publication date: November 25, 2021Inventors: Wenchao ZHOU, Kun SHAO
-
Patent number: 11151819Abstract: An access control method, an access control apparatus, a system, and a storage medium are disclosed. The method includes: acquiring a scene image, and recognizing one or more face images in the scene image; determining an attribute of the face image, the attribute including a registered user and an unregistered user; and if multiple face images are recognized, determining whether attributes corresponding to the multiple face images include the registered user, and responsive to determining that the attributes corresponding to the multiple face images comprise the registered user, controlling an access control device to be opened; responsive to determining that the attributes corresponding to the multiple face images does not comprise the registered user, in condition that an access control verification request instruction is received and verification for the access control verification request instruction succeeds, controlling the access control device to be opened.Type: GrantFiled: November 29, 2019Date of Patent: October 19, 2021Assignee: SHENZHEN SENSETIME TECHNOLOGY CO., LTD.Inventors: Xiang Huang, Zhonghua She, Wenchao Zhou, Liping Xiao
-
Publication number: 20210299562Abstract: A method and apparatus for controlling a virtual camera in a game are disclosed. In the embodiments of the present disclosure, a virtual camera is controlled to shift in response to a first touch operation for a visual field control area, the virtual camera is controlled, in response to the ending of the first touch operation, to return from a second position to a first position, a game operation instruction is received during the returning process, and a corresponding action is performed in response to the game operation instruction.Type: ApplicationFiled: March 22, 2019Publication date: September 30, 2021Inventors: Wenchao ZHOU, Kun SHAO
-
Publication number: 20210232843Abstract: A method and an apparatus for verifying an identity document, an electronic device, and a storage medium include: collecting an identity document image of a current identity document by means of a first camera; recognizing characters in the identity document image to obtain first identity document data; obtaining second identity document data of the identity document by means of an identity document reader; and verifying authenticity of the identity document according to the first identity document data and the second identity document data.Type: ApplicationFiled: September 29, 2018Publication date: July 29, 2021Applicant: SHENZHEN SENSETIME TECHNOLOGY CO., LTD.Inventors: Miaoran XU, Zhongfu ZHANG, Zhonghua SHE, Xubo XIANG, Kun MA, Wenchao ZHOU
-
Patent number: 10994534Abstract: A printing system and method for forming an ink droplet through the use of a multi-pulse driving signal to increase the printing frequency without reducing the droplet size by applying a multi-pulse driving signal to a small nozzle and to increase the inkjet printing speed by using a smaller nozzle to produce the same-size droplet using a multi-pulse driving signal, which allow for higher printing frequency due to the smaller nozzle size as dictated by the fundamental droplet formation dynamics.Type: GrantFiled: April 29, 2019Date of Patent: May 4, 2021Assignee: Board Of Trustees Of The University Of ArkansasInventors: Wenchao Zhou, Chao Sui
-
Publication number: 20200105081Abstract: An access control method, an access control apparatus, a system, and a storage medium are disclosed. The method includes: acquiring a scene image, and recognizing one or more face images in the scene image; determining an attribute of the face image, the attribute including a registered user and an unregistered user; and if multiple face images are recognized, determining whether attributes corresponding to the multiple face images include the registered user, and responsive to determining that the attributes corresponding to the multiple face images comprise the registered user, controlling an access control device to be opened; responsive to determining that the attributes corresponding to the multiple face images does not comprise the registered user, in condition that an access control verification request instruction is received and verification for the access control verification request instruction succeeds, controlling the access control device to be opened.Type: ApplicationFiled: November 29, 2019Publication date: April 2, 2020Applicant: SHENZHEN SENSETIME TECHNOLOGY CO., LTD.Inventors: Xiang HUANG, Zhonghua SHE, Wenchao ZHOU, Liping XIAO
-
Publication number: 20200094477Abstract: A 3D printer comprising a pump, stepper motor adapted to drive the pump and a printing arm connected to a curing source and nozzle.Type: ApplicationFiled: September 25, 2019Publication date: March 26, 2020Applicant: BOARD OF TRUSTEES OF THE UNIVERSITY OF ARKANSASInventors: Casey Trent Lindbloom, Wenchao Zhou
-
Publication number: 20200047500Abstract: A system and method for selective heating and/or sintering of a material including first and second substrates, an array of one or more resistive heating elements arranged on a planar surface of a substrate and material to be heated located on the other substrate.Type: ApplicationFiled: April 3, 2018Publication date: February 13, 2020Applicant: BOARD OF TRUSTEES OF THE UNIVERSITY OF ARKANSASInventors: Wenchao Zhou, Austin Van Horn, Nicholas Holt, Lucas Galvan Marques
-
Publication number: 20190389209Abstract: A printing system and method for forming an ink droplet through the use of a multi-pulse driving signal.Type: ApplicationFiled: April 29, 2019Publication date: December 26, 2019Applicant: BOARD OF TRUSTEES OF THE UNIVERSITY OF ARKANSASInventors: Wenchao Zhou, Chao Sui
-
Patent number: 10437993Abstract: A mechanism called time-deterministic replay (TOR) that can reproduce the execution of a program, including its precise timing. Without TOR, reproducing the timing of an execution is difficult because there are many sources of timing variability. TOR uses a combination of techniques to either mitigate or eliminate most of these sources of variability. Using a prototype implementation of TOR in a Java Virtual Machine, we show it is possible to reproduce the timing to within 1.85% of the original execution. A study of one of the applications of TOR is described: the detection of a covert timing channel. Timing channels can be used to exfiltrate information from a compromised machine by subtly varying timing of the machine's outputs, TOR can detect this variation. Unlike prior solutions, which generally look for a specific type of timing channel, our approach can detect a wide variety of channels with high accuracy.Type: GrantFiled: October 5, 2015Date of Patent: October 8, 2019Assignees: THE TRUSTEES OF THE UNIVERSITY OF PENNSYLVANIA, GEORGETOWN UNIVERSITYInventors: Ang Chen, Hanjun Xiao, William Bradley Moore, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, Wenchao Zhou
-
Publication number: 20180370134Abstract: A 3-D printing system comprising a plurality of printers. The printers are motorized to allow movement in X and Y directions or to rotate freely. Each printer may have one or more printheads. Also provided is a surface independent from said printers adapted to receive a printed object.Type: ApplicationFiled: May 7, 2018Publication date: December 27, 2018Applicant: BOARD OF TRUSTEES OF THE UNIVERSITY OF ARKANSASInventors: Wenchao Zhou, Lucas Galvan Marques, Robert Austin Williams
-
Patent number: 9876851Abstract: The description relates to cloud-edge topologies. Some aspects relate to cloud-edge applications and resource usage in various cloud-edge topologies. Another aspect of the present cloud-edge topologies can relate to the specification of cloud-edge applications using a temporal language. A further aspect can involve an architecture that runs data stream management systems (DSMSs) engines on the cloud and cloud-edge computers to run query parts.Type: GrantFiled: June 25, 2015Date of Patent: January 23, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Badrish Chandramouli, Suman K. Nath, Wenchao Zhou
-
Publication number: 20170213028Abstract: A mechanism called time-deterministic replay (TOR) that can reproduce the execution of a program, including its precise timing. Without TOR, reproducing the timing of an execution is difficult because there are many sources of timing variability. TOR uses a combination of techniques to either mitigate or eliminate most of these sources of variability. Using a prototype implementation of TOR in a Java Virtual Machine, we show it is possible to reproduce the timing to within 1.85% of the original execution. A study of one of the applications of TOR is described: the detection of a covert timing channel. Timing channels can be used to exfiltrate information from a compromised machine by subtly varying timing of the machine's outputs, TOR can detect this variation. Unlike prior solutions, which generally look for a specific type of timing channel, our approach can detect a wide variety of channels with high accuracy.Type: ApplicationFiled: October 5, 2015Publication date: July 27, 2017Inventors: Ang Chen, Hanjun Xiao, William Bradley Moore, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, Wenchao Zhou
-
Publication number: 20150303461Abstract: A negative electrode for a rechargeable battery comprises a zinc oxide member doped with one or more metals and thereafter coated with a conductive layer of carbon or carbon doped with an element selected from the group consisting of fluorine, nitrogen, boron, and a mixture of two or more thereof. The electrode material is prepared by admixing ZnO or doped ZnO with carbon or a carbon-based material and then heating the admixture to form ZnO with a conductive layer. The ZnO can be doped with a first metal and then a second metal.Type: ApplicationFiled: October 22, 2014Publication date: October 22, 2015Inventors: LIN-FENG LI, QUAN FAN, MIN CHEN, WENCHAO ZHOU
-
Publication number: 20150296000Abstract: The description relates to cloud-edge topologies. Some aspects relate to cloud-edge applications and resource usage in various cloud-edge topologies. Another aspect of the present cloud-edge topologies can relate to the specification of cloud-edge applications using a temporal language. A further aspect can involve an architecture that runs data stream management systems (DSMSs) engines on the cloud and cloud-edge computers to run query parts.Type: ApplicationFiled: June 25, 2015Publication date: October 15, 2015Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Badrish CHANDRAMOULI, Suman K. NATH, Wenchao ZHOU
-
Patent number: 9098344Abstract: The description relates to cloud-edge topologies. Some aspects relate to cloud-edge applications and resource usage in various cloud-edge topologies. Another aspect of the present cloud-edge topologies can relate to the specification of cloud-edge applications using a temporal language. A further aspect can involve an architecture that runs data stream management systems (DSMSs) engines on the cloud and cloud-edge computers to run query parts.Type: GrantFiled: December 27, 2011Date of Patent: August 4, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Badrish Chandramouli, Suman K. Nath, Wenchao Zhou
-
Publication number: 20130166712Abstract: The description relates to cloud-edge topologies. Some aspects relate to cloud-edge applications and resource usage in various cloud-edge topologies. Another aspect of the present cloud-edge topologies can relate to the specification of cloud-edge applications using a temporal language. A further aspect can involve an architecture that runs data stream management systems (DSMSs) engines on the cloud and cloud-edge computers to run query parts.Type: ApplicationFiled: December 27, 2011Publication date: June 27, 2013Applicant: Microsoft CorporationInventors: Badrish Chandramouli, Suman K. Nath, Wenchao Zhou