scispace - formally typeset
Search or ask a question

Showing papers by "Motorola published in 2017"


Proceedings Article
01 Jan 2017
TL;DR: This paper frames the challenges of managing data context with basic ABCs: Applications, Behavior, and Change, and presents the initial design of a common metamodel and API, and explores the current state of the storage solutions that could serve the needs of a data context service.
Abstract: Ground is an open-source data context service, a system to manage all the information that informs the use of data. Data usage has changed both philosophically and practically in the last decade, creating an opportunity for new data context services to foster further innovation. In this paper we frame the challenges of managing data context with basic ABCs: Applications, Behavior, and Change. We provide motivation and design guidelines, present our initial design of a common metamodel and API, and explore the current state of the storage solutions that could serve the needs of a data context service. Along the way we highlight opportunities for new research and engineering solutions. 1. FROM CRISIS TO OPPORTUNITY Traditional database management systems were developed in an era of risk-averse design. The technology itself was expensive, as was the on-site cost of managing it. Expertise was scarce and concentrated in a handful of computing and consulting firms. Two conservative design patterns emerged that lasted many decades. First, the accepted best practices for deploying databases revolved around tight control of schemas and data ingest in support of general-purpose accounting and compliance use cases. Typical advice from data warehousing leaders held that “There is no point in bringing data . . . into the data warehouse environment without integrating it” [17]. Second, the data management systems designed for these users were often built by a single vendor and deployed as a monolithic stack. A traditional DBMS included a consistent storage engine, a dataflow engine, a language compiler and optimizer, a runtime scheduler, a metadata catalog, and facilities for data ingest and queueing—all designed to work closely together. As computing and data have become orders of magnitude more efficient, changes have emerged for both of these patterns. Usage is changing profoundly, as expertise and control shifts from the central accountancy of an IT department to the domain expertise of “business units” tasked with extracting value from data [14]. The changes in economics and usage brought on the “three Vs” of Big Data: Volume, Velocity and Variety. Resulting best practices focus on open-ended schema-on-use data “lakes” and agile development, This article is published under a Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0/), which permits distribution and reproduction in any medium as well allowing derivative works, provided that you attribute the original work to the author(s) and CIDR 2017. CIDR ’17 January 8-11, 2017, Chaminade, CA, USA in support of exploratory analytics and innovative application intelligence [28]. Second, while many pieces of systems software that have emerged in this space are familiar, the overriding architecture is profoundly different. In today’s leading open source data management stacks, nearly all of the components of a traditional DBMS are explicitly independent and interchangeable. This architectural decoupling is a critical and under-appreciated aspect of the Big Data movement, enabling more rapid innovation and specialization. 1.1 Crisis: Big Metadata An unfortunate consequence of the disaggregated nature of contemporary data systems is the lack of a standard mechanism to assemble a collective understanding of the origin, scope, and usage of the data they manage. In the absence of a better solution to this pressing need, the Hive Metastore is sometimes used, but it only serves simple relational schemas—a dead end for representing a Variety of data. As a result, data lake projects typically lack even the most rudimentary information about the data they contain or how it is being used. For emerging Big Data customers and vendors, this Big Metadata problem is hitting a crisis point. Two significant classes of end-user problems follow directly from the absence of shared metadata services. The first is poor productivity. Analysts are often unable to discover what data exists, much less how it has been previously used by peers. Valuable data is left unused and human effort is routinely duplicated—particularly in a schema-on-use world with raw data that requires preparation. “Tribal knowledge” is a common description for how organizations manage this productivity problem. This is clearly not a systematic solution, and scales very poorly as organizations grow. The second problem stemming from the absence of a system to track metadata is governance risk. Data management necessarily entails tracking or controlling who accesses data, what they do with it, where they put it, and how it gets consumed downstream. In the absence of a standard place to store metadata and answer these questions, it is impossible to enforce policies and/or audit behavior. As a result, many administrators marginalize their Big Data stack as a playpen for non-critical data, and thereby inhibit both the adoption and the potential of new technologies. In our experiences deploying and managing systems in production, we have seen the need for a common service layer to support the capture, publishing and sharing of metadata information in a flexible way. The effort in this paper began by addressing that need. 1.2 Opportunity: Data Context The lack of metadata services in the Big Data stack can be viewed as an opportunity: a clean slate to rethink how we track and leverage modern usage of data. Storage economics and schema-on-use agility suggest that the Data Lake movement could go much farther than Data Warehousing in enabling diverse, widely-used central repositories of data that can adapt to new data formats and rapidly changing organizations. In that spirit, we advocate rethinking traditional metadata in a far more comprehensive sense. More generally, what we should strive to capture is the full context of data. To emphasize the conceptual shifts of this data context, and as a complement to the “three Vs” of Big Data, we introduce three key sources of information—the ABCs of Data Context. Each represents a major change from the simple metadata of traditional enterprise data management. Applications: Application context is the core information that describes how raw bits get interpreted for use. In modern agile scenarios, application context is often relativistic (many schemas for the same data) and complex (with custom code for data interpretation). Application context ranges from basic data descriptions (encodings, schemas, ontologies, tags), to statistical models and parameters, to user annotations. All of the artifacts involved—wrangling scripts, view definitions, model parameters, training sets, etc.—are critical aspects of application context. Behavior: This is information about how data was created and used over time. In decoupled systems, behavioral context spans multiple services, applications and formats and often originates from highvolume sources (e.g., machine-generated usage logs). Not only must we track upstream lineage— the data sets and code that led to the creation of a data object—we must also track the downstream lineage, including data products derived from this data object. Aside from data lineage, behavioral context includes logs of usage: the “digital exhaust” left behind by computations on the data. As a result, behavioral context metadata can often be larger than the data itself. Change: This is information about the version history of data, code and associated information, including changes over time to both structure and content. Traditional metadata focused on the present, but historical context is increasingly useful in agile organizations. This context can be a linear sequence of versions, or it can encompass branching and concurrent evolution, along with interactions between co-evolving versions. By tracking the version history of all objects spanning code, data, and entire analytics pipelines, we can simplify debugging and enable auditing and counterfactual analysis. Data context services represent an opportunity for database technology innovation, and an urgent requirement for the field. We are building an open-source data context service we call Ground, to serve as a central model, API and repository for capturing the broad context in which data gets used. Our goal is to address practical problems for the Big Data community in the short term and to open up opportunities for long-term research and innovation. In the remainder of the paper we illustrate the opportunities in this space, design requirements for solutions, and our initial efforts to tackle these challenges in open source. 2. DIVERSE USE CASES To illustrate the potential of the Ground data context service, we describe two concrete scenarios in which Ground can aid in data discovery, facilitate better collaboration, protect confidentiality, help diagnose problems, and ultimately enable new value to be captured from existing data. After presenting these scenarios, we explore the design requirements for a data context service. 2.1 Scenario: Context-Enabled Analytics This scenario represents the kind of usage we see in relatively technical organizations making aggressive use of data for machinelearning driven applications like customer targeting. In these organizations, data analysts make extensive use of flexible tools for data preparation and visualization and often have some SQL skills, while data scientists actively prototype and develop custom software for machine learning applications. Janet is an analyst in the Customer Satisfaction department at a large bank. She suspects that the social network behavior of customers can predict if they are likely to close their accounts (customer churn). Janet has access to a rich context-service-enabled data lake and a wide range of tools that she can use to assess her hypothesis. Janet begins by downloading a free sample of a social media feed. She uses an advanced data catalog application (we’ll call it “Catly”) which connects to Ground, recognizes the co

97 citations


Journal ArticleDOI
TL;DR: The results demonstrate the accuracy of the mFR is comparable to traditional dietary records and other image-based methods, and no systematic biases could be found.
Abstract: The mobile Food Record (mFR) is an image-based dietary assessment method for mobile devices. The study primary aim was to test the accuracy of the mFR by comparing reported energy intake (rEI) to total energy expenditure (TEE) using the doubly labeled water (DLW) method. Usability of the mFR was assessed by questionnaires before and after the study. Participants were 45 community dwelling men and women, 21–65 years. They were provided pack-out meals and snacks and encouraged to supplement with usual foods and beverages not provided. After being dosed with DLW, participants were instructed to record all eating occasions over a 7.5 days period using the mFR. Three trained analysts estimated rEI from the images sent to a secure server. rEI and TEE correlated significantly (Spearman correlation coefficient of 0.58, p < 0.0001). The mean percentage of underreporting below the lower 95% confidence interval of the ratio of rEI to TEE was 12% for men (standard deviation (SD) ± 11%) and 10% for women (SD ± 10%). The results demonstrate the accuracy of the mFR is comparable to traditional dietary records and other image-based methods. No systematic biases could be found. The mFR was received well by the participants and usability was rated as easy.

53 citations


Proceedings ArticleDOI
01 Dec 2017
TL;DR: An overview of LTE-M is provided and evaluated against 5G performance targets and it is shown that mMTC requirements can be satisfied by LTE-B, and 4 receive antennas at the eNB are required instead of the more typical 2 receive antennas.
Abstract: Massive machine type communication (mMTC) has been identified as an important use case for 5G New Radio wireless technology In 4G Long-Term Evolution (LTE), 3GPP has previously introduced LTE-M for low-power, wide-area networks supporting the Internet of Things Rel-13 specifications for LTE-M were completed in 2016 Rel-14 enhancements were completed in 2017 while Rel-15 enhancements are ongoing and expected to be completed in 2018 In this paper, we provide an overview of LTE-M and describe its evolution in subsequent releases The features of the technology that have specifically been designed for mMTC are discussed In addition, we present evaluations of LTE-M against 5G performance targets and show that mMTC requirements can be satisfied by LTE-M To meet the 5G mMTC requirements, 3-dB power spectral density boosting is used in the downlink In addition, for some requirements, 4 receive antennas at the eNB are required instead of the more typical 2 receive antennas Thus, LTE-M will comprise an important component of 5G New Radio technology

41 citations


Journal ArticleDOI
TL;DR: In this article, the authors proposed a short-time matrix pencil method that decomposes the measurement samples in a sliding window into time-indexed complex frequencies, based on the fact that the extracted damping factors (i.e., the real part of the complex frequencies) are zero when the arriving wave is located in the middle of the sliding window.
Abstract: This paper proposes a new technique for detection of traveling-wave arrival times in power systems. Precise estimation of wave arrival times improves most of the traveling-wave-based fault location methods. The proposed technique is based on the short-time matrix pencil method that decomposes the measurement samples in a sliding window into time-indexed complex frequencies. Traveling-wave arrival times are estimated based on the fact that the extracted damping factors (i.e., the real part of the complex frequencies) are zero when the arriving wave is located in the middle of the sliding window. The proposed technique is compared to the existing transient-detection techniques such as discrete wavelet transform with commonly used mother wavelets and Hilbert transform (HT), using MATLAB Wavelet Toolbox and MATLAB HT. The sensitivity analysis based on the simulation results demonstrates that the proposed technique is less affected by the measurement noise, sampling frequency, and fault parameters.

32 citations


Patent
25 Apr 2017
TL;DR: In this article, a priority order of multiple logical channels based on the uplink transmission parameters and a logical channel priority of the multiple channels was determined by a processor that assigns resources to logical channels of the logical channels.
Abstract: Apparatuses, methods, and systems are disclosed for determining a priority order based on uplink transmission parameters. One apparatus includes a receiver that receives an uplink grant corresponding to uplink transmission parameters that include an indication of a numerology and a transmission time interval length. The apparatus includes a processor that determines a priority order of multiple logical channels based on the uplink transmission parameters and a logical channel priority of the multiple logical channels. The processor assigns resources to logical channels of the multiple logical channels based on the priority order.

25 citations


Patent
31 May 2017
TL;DR: In this article, an electronic device includes a microphone that receives an audio signal that includes a spoken trigger phrase, and a processor that is electrically coupled to the microphone The processor measures characteristics of the audio signal, and determines, based on the measured characteristics, whether the spoken trigger phrases is acceptable for trigger phrase model training.
Abstract: An electronic device includes a microphone that receives an audio signal that includes a spoken trigger phrase, and a processor that is electrically coupled to the microphone The processor measures characteristics of the audio signal, and determines, based on the measured characteristics, whether the spoken trigger phrase is acceptable for trigger phrase model training If the spoken trigger phrase is determined not to be acceptable for trigger phrase model training, the processor rejects the trigger phrase for trigger phrase model training

25 citations


Patent
Seongchul Daniel Hong1
17 Mar 2017
TL;DR: In this paper, a self-compensating system composed of a series of PIN diode circuits that are formed as active matrix organic light emitting diodes (AMOLEDs) at least partially within the gap between pixels in the display active area.
Abstract: Various embodiments provide a computing device that includes a self-compensating system embedded in the device's display active area. The self-compensating system is composed of a series of PIN diode circuits that include PIN diodes that are formed as active matrix organic light emitting diodes (AMOLEDs) at least partially within the gap between pixels in the display active area.

20 citations


Proceedings ArticleDOI
09 Nov 2017
TL;DR: The difference of opinions among software testers is discussed, regarding work-related factors that could impact their motivation, which can be relevant for managers and leaders in software engineering practice.
Abstract: Context. Considering the importance of software testing to the development of high quality and reliable software systems, this paper aims to investigate how can work-related factors influence the motivation of software testers. Method. We applied a questionnaire that was developed using a previous theory of motivation and satisfaction of software engineers to conduct a survey-based study to explore and understand how professional software testers perceive and value work-related factors that could influence their motivation at work. Results. With a sample of 80 software testers we observed that software testers are strongly motivated by variety of work, creative tasks, recognition for their work, and activities that allow them to acquire new knowledge, but in general the social impact of this activity has low influence on their motivation. Conclusion. This study discusses the difference of opinions among software testers, regarding work-related factors that could impact their motivation, which can be relevant for managers and leaders in software engineering practice.

20 citations


Patent
29 Mar 2017
TL;DR: In this paper, a method for placing a first processor in a sleep operating mode and running a second processor that is operative to wake the first processor from the sleep operation in response to a speech command phrase is described.
Abstract: A method include placing a first processor in a sleep operating mode and running a second processor that is operative to wake the first processor from the sleep operating mode in response to a speech command phrase. The method includes identifying, by the second processor, a speech command phrase segment and performing a control operation in response to detecting the segment in detected speech. The control operation is performed while the first processor is maintained in the sleep operating mode.

17 citations


Patent
16 May 2017
TL;DR: In this paper, a method and apparatus provide synchronization signals and random access for flexible radio communication including a synchronization signal including a synchronisation signal can be received with a first subcarrier spacing and a first bandwidth.
Abstract: A method and apparatus provide synchronization signals and random access for flexible radio communication. Downlink orthogonal frequency division multiplexing signals including a synchronization signal can be received. The synchronization signal can be transmitted with a first subcarrier spacing and a first bandwidth. Cell detection can be performed using the received downlink orthogonal frequency division multiplexing signals to detect at least one cell. A cell of the at least one detected cell can be selected. Information of at least one subcarrier spacing associated with the selected cell can be received. The at least one subcarrier spacing can be used for communication. A second subcarrier spacing can be selected from the at least one subcarrier spacing. Fine downlink timing information can be obtained from an extended synchronization signal having a second bandwidth when the selected second subcarrier spacing is larger than the first subcarrier spacing. Transmitting can be performed using the fine downlink timing information.

14 citations


Patent
27 Jun 2017
TL;DR: In this article, a method and apparatus for discontinuous reception for a shortened transmission time interval and processing time includes a device monitoring for data transmission scheduling assignments during an active time of a DRX cycle, and detecting a transmission during the active time.
Abstract: A method and apparatus for discontinuous reception for a shortened transmission time interval and processing time includes a device monitoring for data transmission scheduling assignments during an active time of a DRX cycle, and detecting a transmission during the active time. The method further includes the device starting a first timer, in response to the detecting, wherein the first timer is set for a first timer value that specifies an amount of time between detecting the transmission and starting a second timer that extends the active time by a second timer value. The first timer value is determined based on one or both of a selected first TTI length from multiple TTI lengths for which the device can be enabled and/or a selected shorter first processing time over a second processing time associated with a TTI length used by the device.

Patent
Apostolis K. Salkintzis1
13 Oct 2017
TL;DR: In this paper, a processor determines whether PDCP packet duplication associated with the PDCP protocol entity is to be activated and, if so, communicates with a mobile communication network according to a packet duplication mode of operation.
Abstract: For switching between packet duplication operating modes, methods, apparatus, and systems are disclosed. One apparatus includes a processor and a transceiver that communicates with a mobile communication network via a radio bearer. The processor determines whether PDCP packet duplication associated with the PDCP protocol entity is to be activated and, if so, communicates with a mobile communication network according to a packet duplication mode of operation. Otherwise, the processor determines whether a split threshold value of the PDCP protocol entity is set to a predefined value, communicates with the mobile communication network according to a first split bearer mode of operation in response to determining that the split threshold value is set to the predefined value, and communicates with the mobile communication network according to a second split bearer mode of operation in response to determining that the split threshold value is not set to the predefined value.

Proceedings ArticleDOI
04 Jun 2017
TL;DR: It is shown that eMTC UE can provide similar coverage to non-eM TC UE using the same delay and block error rate requirements for delay-sensitive Voice over LTE (VoLTE) service.
Abstract: The Internet of Things (IoT) is expected to reach a massive scale in the next few years and LTE has introduced a feature in Rel-13 called eMTC to support wide-area connectivity for IoT devices. One important trend for IoT is the integration of voice capability into the devices. However, low-cost, low-complexity IoT User Equipment (UE) typically supports only half-duplex communication and low data rates. In this paper, we compare the performance and coverage of low-complexity eMTC UE with legacy non-eMTC UE for delay-sensitive Voice over LTE (VoLTE) service. It is shown that eMTC UE can provide similar coverage to non-eMTC UE using the same delay and block error rate requirements. If the delay budget or quality of service can be relaxed for eMTC, then eMTC can provide slightly better VoLTE coverage. This allows service operators to support voice capability for IoT devices using existing infrastructure footprint.

Proceedings ArticleDOI
13 Sep 2017
TL;DR: The human factors research program being undertaken by Motorola Labs is outlined to evaluate key elements of such a multi-model interface as well as the key human factors issues involved in aMulti-modal interface.
Abstract: The car of the future will have many new information sources— including telematics systems, navigation systems and Advanced Driver Assistance Systems (ADAS)—that will compete for a driver’s limited cognitive attention. If they are implemented as completely separate systems then cognitive overload and driver distraction are inevitable outcomes. However, if they are implemented as an integrated intelligent system with a multi-modal interface, then the benefits of such functionality will be achieved with much less impact on driving safety. Such a system will support the task of safe driving by filtering and mediating information in response to real-world driving demands. This paper outlines the Human Factors research program being undertaken by Motorola Labs to evaluate key elements of such a multi-modal interface as well as the key human factors issues involved in a multi-modal interface.

Patent
Ranjeet Gupta1, Sudhir C. Vissa1
27 Jul 2017
TL;DR: In this paper, a mobile device processor will wake from the low power state in response to detecting an audio trigger corresponding to an audio public announcement at a location of the mobile device.
Abstract: A mobile device runs audio recognition while operating in a low power state. A mobile device processor will wake from the low power state in response to detecting an audio trigger corresponding to an audio public announcement at a location of the mobile device. The mobile device will receive the audio public announcement and display a text version of the audio public announcement on the mobile device display.

Patent
24 Mar 2017
TL;DR: In this article, a processor detects a split bearer configuration for a mobile device and routes PDCP PDU in a Radio Link Control (RLC)/Medium Access Control (MAC) for the at least two cell groups.
Abstract: For routing Packet Data Converge Protocol (PDCP) Protocol Data Units (PDU), a processor detects a split bearer configuration for a mobile device. In response to detecting the split bearer configuration, the processor routes PDCP PDU in a Radio Link Control (RLC)/Medium Access Control (MAC) for the at least two cell groups.

Patent
Jun-Ki Min1
28 Mar 2017
TL;DR: In this article, the authors generate a haptic feedback on a headphone to indicate contexts of ambient sound to alert the wearer to audible cues of potentially dangerous situations that otherwise would be suppressed by the noise cancellation feature of the headphones.
Abstract: Haptic feedback is generated on a headphone to indicate contexts of ambient sound. In this way, noise-canceling headphones can alert the wearer to audible cues of potentially dangerous situations that otherwise would be suppressed by the noise cancellation feature of the headphones.

Proceedings ArticleDOI
01 Jul 2017
TL;DR: This article outlines a Capacity based MEA design approach that can be employed routinely by Multiple Input Multiple Output wireless systems and their effective radiation pattern is controlled by smart algorithms.
Abstract: A Multi Element Antenna (MEA) is an array of antennas that can be driven independently so as to, among other things, mitigate adverse and variable propagation environment effects. MEAs are employed routinely by Multiple Input Multiple Output (MIMO) wireless systems and their effective radiation pattern is controlled by smart algorithms. As such, optimal MEA design cannot rely on traditional specifications like gain alone. This article outlines a Capacity based MEA design approach.

Proceedings ArticleDOI
TL;DR: In this article, the authors investigated how work-related factors influence the motivation of software testers and found that software testers are strongly motivated by variety of work, creative tasks, recognition for their work, and activities that allow them to acquire new knowledge, but the social impact of this activity has low influence on their motivation.
Abstract: Context. Considering the importance of software testing to the development of high quality and reliable software systems, this paper aims to investigate how can work-related factors influence the motivation of software testers. Method. We applied a questionnaire that was developed using a previous theory of motivation and satisfaction of software engineers to conduct a survey-based study to explore and understand how professional software testers perceive and value work-related factors that could influence their motivation at work. Results. With a sample of 80 software testers we observed that software testers are strongly motivated by variety of work, creative tasks, recognition for their work, and activities that allow them to acquire new knowledge, but in general the social impact of this activity has low influence on their motivation. Conclusion. This study discusses the difference of opinions among software testers, regarding work-related factors that could impact their motivation, which can be relevant for managers and leaders in software engineering practice.

Patent
05 May 2017
TL;DR: In this article, a method, system, and computer program product for generating a 3D image from a captured two-dimensional image is presented, which includes capturing, via a wide-angle camera sensor of an image capturing device, a 2D image of a scene and determining depth information of the scene.
Abstract: A method, system, and computer program product for generating a three-dimensional image from a captured two-dimensional image. The method includes capturing, via a wide-angle camera sensor of an image capturing device, a two-dimensional image of a scene. The method further includes determining depth information of the scene. The method further includes generating, from the depth information, a depth map that depicts a depth of the scene in a third dimension. The method further includes generating a wide-angle three-dimensional image by merging the depth map and the two-dimensional image.

Proceedings ArticleDOI
Chip Wood1, Robert H. Leivian1, Noel Massey1, Jack Bieker1, John Summers1 
13 Sep 2017
TL;DR: A DA Tool (DAT) has been developed to coordinate with a KQ (previously Hyperion) virtual driving simulator and allow the merging of the simulated driving performance, the environmental sensors, and the intelligent use of audio, visual, and tactile feedback to alert the driver to potential danger and unsafe driving behavior.
Abstract: Using scenario driven research, a Driver Advocate (DA) system has been designed to advise the driver about potentially unsafe siuations based on information from environmental sensors. DA is an intelligent dynamic system that monitors, senses, prioritizes, personalizes, and sends alerts to the driver appropriate to the moment. This has the potential to sharply decrease driver distraction and inattention. To support the realization of DA, a DA Tool (DAT) has been developed to coordinate with a KQ (previously Hyperion) virtual driving simulator and allow the merging of the simulated driving performance, the environmental sensors, and the intelligent use of audio, visual, and tactile feedback to alert the driver to potential danger and unsafe driving behavior. DAT monitors the traffic, lane following, forward and side clearances, vehicle condition, cockpit distractions, Infotainment use, and the driver affective behavior. The DAT is designed to be highly configurable, flexible, and user friendly to facilitate creative freedom in designing usability and human factors experiments and rapid prototyping. For the covering abstract see ITRD E113119.

Patent
19 Jan 2017
TL;DR: In this article, a modular magnetic assembly includes a decorative modular section that is stackable with a functional modular section on a housing of a mobile device to form the modular magnet assembly.
Abstract: In embodiments, a modular magnetic assembly includes a decorative modular section that is stackable with a functional modular section on a housing of a mobile device to form the modular magnetic assembly. The mobile device includes housing metal plates that are integrated in the housing of the device. The functional modular section includes magnets that are each positioned to couple with a respective housing metal plate that is integrated in the device housing. The decorative modular section includes section metal plates that are each positioned to couple with a respective one of the magnets of the functional modular section. The magnets of the functional modular section couple together the decorative modular section and the housing of the mobile device, where one side of the functional modular section stacks against the mobile device, and the other side stacks against the decorative modular section to form the modular magnetic assembly.

Patent
Haipeng Lei1, Chenxi Zhu
31 Mar 2017
TL;DR: In this article, an apparatus consisting of a transmitter (300) and a receiver (335) that transmits data to a base unit (110) in a first transmission time interval (TTI) is described.
Abstract: Apparatuses, methods, and systems are disclosed for ceasing transmission repetition. One apparatus (300) includes a transmitter (330) that transmits (805) data to a base unit (110) in a first transmission time interval ( "TTI" ). Here, the data is configured for transmission with a predetermined number of repetitions. The apparatus includes a receiver (335) that receives (810) a control signal (220) from the base unit (110) in a second TTI. The apparatus (300) includes a processor (305) that determines (815) whether the control signal corresponds to the data and, in response to the control signal corresponding to the data, determines (820) whether to cease at least one transmission repetition of the data before the number of repetitions reaches the predetermined number.

Patent
Roger W. Harmon1
31 May 2017
TL;DR: In this article, a first follower is biased against a first side of the cat head shaped cam by a first spring disposed between the first follower and the first device housing, and a second follower is neutralized against a second side of a cat head-shaped cam by the second follower.
Abstract: An electronic device includes a first device housing and a second device housing. A hinge couples the first device housing to the second device housing. The first device housing is pivotable about the hinge relative to the second device housing. The hinge includes a cam, which can be shaped like the head of a cat. A first follower is biased against a first side of the cat head shaped cam by a first spring disposed between the first follower and the first device housing. A second follower is biased against a second side of the cat head shaped cam by a second spring disposed between the second follower and the second device housing.

Patent
26 Oct 2017
TL;DR: In this article, a thermal sensor is used to detect the thermal energy of the thermal sensor in a two-dimensional (2D) and 3D (3D) image.
Abstract: An electronic device includes a two-dimensional imager, a three-dimensional imager, and a thermal sensor One or more processors determine whether at least one image captured by the two-dimensional imager matches a first predefined criterion, whether at least one facial depth scan captured by the three-dimensional imager matches a second predefined criterion, and whether thermal energy detected by the thermal sensor matches a third predefined criterion Touchless authentication of a person as an authorized user of the electronic device occurs when the at least one image matches the first predefined criterion, the at least one facial depth scan matches the second predefined criterion, and the thermal energy matches the third predefined criterion Additional security factors, such as the expression of a predefined mien, can be used as well

Patent
11 Aug 2017
TL;DR: In this article, a control channel including one or more control channel transmissions is then received in support of the established communication connection, based upon the control channel transmission structure defined by the at least one of the received parameters.
Abstract: A method and apparatus include establishing a communication connection with a communication network via an access point. As part of establishing a communication connection, information is received for defining a format of the communication connection. The format to be used as part of the communication connection includes one or more parameters which are received from the communication network when establishing the communication connection. At least one of the one or more received parameters serves to define a control channel transmission structure to be used as part of the format. A control channel including one or more control channel transmissions is then received in support of the established communication connection, based upon the control channel transmission structure defined by the at least one of the one or more received parameters.

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors analyzed what knowledge is of most worth, and provided the helpful advices on practical scientific knowledge education based on Herbert Spencer's "What Knowledge is of Most Worth?".
Abstract: For industrial structure upgrading and modern service industry developing, China will need a large number of high-quality talents to contribute to new industrialization. China's higher education is important for cultivating high-quality, multi-skilled and well-trained talents. “What Knowledge is of most Worth?” that raised by Herbert Spencer is one of the most typical questions for education. After investigation, this study researches 2 questions based on China’s huge demand of well-trained, high-skilled, and application-oriented talents under current economic development: 1) “What Knowledge is of most Worth?” Practical Scientific Knowledge. 2) The guidance on the education practice. The essay demonstrates the challenges and provides constructive suggestions including reform education curriculum, strengthen faculty and enhance university-enterprise cooperation which is multi-win for undergraduates, universities and enterprises. Based on the university-enterprise cooperation practice with company M, the experiences are summarized and the research results can be popularized. This thesis will analyze Herbert Spencer’s “What Knowledge is of Most Worth?”, and provide the helpful advices on practical scientific knowledge education based on Herbert Spencer’s “What Knowledge is of Most Worth?”

Patent
06 Jul 2017
TL;DR: In this article, a method and apparatus for managing audio readouts and visual notifications is presented, which includes an audio output device, a display device, and a processor, with a memory that stores code executable by the processor to determine a user attention state, and present, via the display devices, a visual cue in a visual notification that corresponds to the audio readout, in response to the user attention being a state of user interest.
Abstract: For managing audio readouts and visual notifications, a method and apparatus are disclosed. The apparatus includes audio output device, a display device, a processor, and a memory that stores code executable by the processor to: present, via the audio output device, an audio readout to the user of the apparatus, determine a user attention state, and present, via the display device, a visual cue in a visual notification that corresponds to the audio readout, in response to the user attention state being a state of user interest. The visual cue may indicate a location in the visual notification that corresponds to a current position of the audio readout. Determining the user attention state to be a state of user interest may include receiving sensor data and determining whether a user is holding the apparatus based on the sensor data.

Patent
17 Feb 2017
TL;DR: In this article, a face detection system is used to scale the candidate face to an actual size for comparison against biometric data on a range of sizes of a human face, and the confidence value for face detection is increased or decreased in relation to the validation by size/temperature.
Abstract: An electronic device incorporates features that are dependent on finding a face by image processing of an image taken by an image capturing device. To avoid false positives and false negatives due to poor focus, exposure, or spoofing with a picture, the electronic device validates, by distance and/or temperature, a candidate face within a captured image. Distance information is used to scale the candidate face to an actual size for comparison against biometric data on a range of sizes of a human face. Detected temperature is compared against biometric data on the temperature of a human face sensed in the infrared spectrum. Confidence value for face detection is increased or decreased in relation to the validation by size/temperature. For a validated candidate having a confidence value above a threshold, the electronic device can adjust camera controls of an image capturing device or enable a face recognition security component.

Patent
18 Sep 2017
TL;DR: In this article, the authors describe a system for directional display and audio broadcast in an environment, which includes an individual query, a group query, and a display request (e.g., picture, video, web page, and the like).
Abstract: Systems, devices, and techniques for directional display and audio broadcast are described. It is determined whether a spoken query includes an individual query, a group query, and a display request. For an individual query, an audio response is broadcast in a directional manner towards the source of the spoken query. For a group query, an audio response is broadcast in more than one direction, such as towards directions of sources in an environment. For a display request, an image (e.g., picture, video, web page, and the like) is projected on a surface that is detected so the image is viewable by one or more users, such as the source of the spoken query.