scispace - formally typeset
Search or ask a question

Showing papers on "Personal computer published in 2003"


Journal ArticleDOI
TL;DR: This work has used extensive and realistic computer simulations to show that the topological accuracy of this new method is at least as high as that of the existing maximum-likelihood programs and much higher than the performance of distance-based and parsimony approaches.
Abstract: The increase in the number of large data sets and the complexity of current probabilistic sequence evolution models necessitates fast and reliable phylogeny reconstruction methods. We describe a new approach, based on the maximum- likelihood principle, which clearly satisfies these requirements. The core of this method is a simple hill-climbing algorithm that adjusts tree topology and branch lengths simultaneously. This algorithm starts from an initial tree built by a fast distance-based method and modifies this tree to improve its likelihood at each iteration. Due to this simultaneous adjustment of the topology and branch lengths, only a few iterations are sufficient to reach an optimum. We used extensive and realistic computer simulations to show that the topological accuracy of this new method is at least as high as that of the existing maximum-likelihood programs and much higher than the performance of distance-based and parsimony approaches. The reduction of computing time is dramatic in comparison with other maximum-likelihood packages, while the likelihood maximization ability tends to be higher. For example, only 12 min were required on a standard personal computer to analyze a data set consisting of 500 rbcL sequences with 1,428 base pairs from plant plastids, thus reaching a speed of the same order as some popular distance-based and parsimony algorithms. This new method is implemented in the PHYML program, which is freely available on our web page: http://www.lirmm.fr/w3ifa/MAAS/. (Algorithm; computer simulations; maximum likelihood; phylogeny; rbcL; RDPII project.) The size of homologous sequence data sets has in- creased dramatically in recent years, and many of these data sets now involve several hundreds of taxa. More- over, current probabilistic sequence evolution models (Swofford et al., 1996 ; Page and Holmes, 1998 ), notably those including rate variation among sites (Uzzell and Corbin, 1971 ; Jin and Nei, 1990 ; Yang, 1996 ), require an increasing number of calculations. Therefore, the speed of phylogeny reconstruction methods is becoming a sig- nificant requirement and good compromises between speed and accuracy must be found. The maximum likelihood (ML) approach is especially accurate for building molecular phylogenies. Felsenstein (1981) brought this framework to nucleotide-based phy- logenetic inference, and it was later also applied to amino acid sequences (Kishino et al., 1990). Several vari- ants were proposed, most notably the Bayesian meth- ods (Rannala and Yang 1996; and see below), and the discrete Fourier analysis of Hendy et al. (1994), for ex- ample. Numerous computer studies (Huelsenbeck and Hillis, 1993; Kuhner and Felsenstein, 1994; Huelsenbeck, 1995; Rosenberg and Kumar, 2001; Ranwez and Gascuel, 2002) have shown that ML programs can recover the cor- rect tree from simulated data sets more frequently than other methods can. Another important advantage of the ML approach is the ability to compare different trees and evolutionary models within a statistical framework (see Whelan et al., 2001, for a review). However, like all optimality criterion-based phylogenetic reconstruction approaches, ML is hampered by computational difficul- ties, making it impossible to obtain the optimal tree with certainty from even moderate data sets (Swofford et al., 1996). Therefore, all practical methods rely on heuristics that obtain near-optimal trees in reasonable computing time. Moreover, the computation problem is especially difficult with ML, because the tree likelihood not only depends on the tree topology but also on numerical pa- rameters, including branch lengths. Even computing the optimal values of these parameters on a single tree is not an easy task, particularly because of possible local optima (Chor et al., 2000). The usual heuristic method, implemented in the pop- ular PHYLIP (Felsenstein, 1993 ) and PAUP ∗ (Swofford, 1999 ) packages, is based on hill climbing. It combines stepwise insertion of taxa in a growing tree and topolog- ical rearrangement. For each possible insertion position and rearrangement, the branch lengths of the resulting tree are optimized and the tree likelihood is computed. When the rearrangement improves the current tree or when the position insertion is the best among all pos- sible positions, the corresponding tree becomes the new current tree. Simple rearrangements are used during tree growing, namely "nearest neighbor interchanges" (see below), while more intense rearrangements can be used once all taxa have been inserted. The procedure stops when no rearrangement improves the current best tree. Despite significant decreases in computing times, no- tably in fastDNAml (Olsen et al., 1994 ), this heuristic becomes impracticable with several hundreds of taxa. This is mainly due to the two-level strategy, which sepa- rates branch lengths and tree topology optimization. In- deed, most calculations are done to optimize the branch lengths and evaluate the likelihood of trees that are finally rejected. New methods have thus been proposed. Strimmer and von Haeseler (1996) and others have assembled four- taxon (quartet) trees inferred by ML, in order to recon- struct a complete tree. However, the results of this ap- proach have not been very satisfactory to date (Ranwez and Gascuel, 2001 ). Ota and Li (2000, 2001) described

16,261 citations


Patent
20 May 2003
TL;DR: In this paper, a wireless communication module system for use with a portable personal computer (PC) having a motherboard and an integral display screen is presented, which includes a single wired interface having first and second ends, where the first end is coupled to the motherboard and the second end to the display screen and provides a connection port.
Abstract: The present invention provides a wireless communication module system for use with a portable personal computer (PC) having a motherboard and an integral display screen In one embodiment, the system includes a single wired interface having first and second ends, where the first end is coupled to the motherboard and the second end is coupled to the display screen and provides a connection port The system further includes a wireless communication module having an antenna and an interface port removably coupled to the connection port In this embodiment, the module also includes a transceiver configured to employ the antenna to transmit and receive radio communication signals, where the transceiver is further configured to employ the interface port to communicate with the motherboard A method for performing a wireless communication and a wireless communication system incorporating the wireless communication module system or the method are also disclosed

502 citations


Journal ArticleDOI
TL;DR: The computerized method has advantages over the S-ETDRS testing in electronically capturing the data for each tested letter, requiring only a single distance for testing from 20/12 to 20/800, potentially reducing testing time, and potentially decreasing technician-related bias.

497 citations


Patent
03 Mar 2003
TL;DR: In this paper, the authors present a method and apparatus for sending and retrieving location relevant information to a user by selecting and designating a point of interest that is displayed on a graphical user interface and sending the location information associated with that point-of-interest to a receiver that is also selected using the graphical interface.
Abstract: The present invention is directed to a method and apparatus for sending and retrieving location relevant information to a user by selecting and designating a point of interest that is displayed on a graphical user interface and sending the location information associated with that point of interest to a receiver that is also selected using the graphical user interface. The location relevant information may also include mapped routes, waypoints, geo-fenced areas, moving vehicles etc. Updated location relevant information may also be continuously sent to the user while generating updated mapping information on the graphical user interface. The present invention may be practiced by using communication devices such as a personal computer, a personal digital assistance, in-vehicle navigation systems, or a mobile telephone.

399 citations


Journal ArticleDOI
TL;DR: Results indicate that a root-mean-square error in elevation between ±7 and ±15 m can be achieved with ASTER stereo image data of good quality, and the ability to extract elevations from ASTER stereopairs using stereocorrelation techniques meets expectations.
Abstract: The Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on-board the National Aeronautics and Space Administration's (NASA's) Terra spacecraft provides along-track digital stereo image data at 15-m resolution. As part of ASTER digital elevation model (DEM) accuracy evaluation efforts by the US/Japan ASTER Science Team, stereo image data for four study sites around the world have been employed to validate prelaunch estimates of heighting accuracy. Automated stereocorrelation procedures were implemented using the Desktop Mapping System (DMS) software on a personal computer to derive DEMs with 30- to 150-m postings. Results indicate that a root-mean-square error (RMSE) in elevation between ±7 and ±15 m can be achieved with ASTER stereo image data of good quality. An evaluation of an ASTER DEM data product produced at the US Geological Survey (USGS) EROS Data Center (EDC) yielded an RMSE of ±8.6 m. Overall, the ability to extract elevations from ASTER stereopairs using stereocorrelation techniques meets expectations.

387 citations


Journal ArticleDOI
TL;DR: In this paper, a model of heat transfer and solidification of the continuous casting of steel slabs is described, including phenomena in the mold and spray regions, which can be applied to a wide range of practical problems in continuous casters.
Abstract: A simple, but comprehensive model of heat transfer and solidification of the continuous casting of steel slabs is described, including phenomena in the mold and spray regions. The model includes a one-dimensional (1-D) transient finite-difference calculation of heat conduction within the solidifying steel shell coupled with two-dimensional (2-D) steady-state heat conduction within the mold wall. The model features a detailed treatment of the interfacial gap between the shell and mold, including mass and momentum balances on the solid and liquid interfacial slag layers, and the effect of oscillation marks. The model predicts the shell thickness, temperature distributions in the mold and shell, thickness of the resolidified and liquid powder layers, heat-flux profiles down the wide and narrow faces, mold water temperature rise, ideal taper of the mold walls, and other related phenomena. The important effect of the nonuniform distribution of superheat is incorporated using the results from previous three-dimensional (3-D) turbulent fluid-flow calculations within the liquid pool. The FORTRAN program CONID has a user-friendly interface and executes in less than 1 minute on a personal computer. Calibration of the model with several different experimental measurements on operating slab casters is presented along with several example applications. In particular, the model demonstrates that the increase in heat flux throughout the mold at higher casting speeds is caused by two combined effects: a thinner interfacial gap near the top of the mold and a thinner shell toward the bottom. This modeling tool can be applied to a wide range of practical problems in continuous casters.

381 citations


Journal ArticleDOI
TL;DR: The application of a new automated, unbiased, multivariate statistical analysis technique to very large X-ray spectral image data sets, based in part on principal components analysis, returns physically accurate component spectra and images in a few minutes on a standard personal computer.
Abstract: Spectral imaging in the scanning electron microscope (SEM) equipped with an energy-dispersive X-ray (EDX) analyzer has the potential to be a powerful tool for chemical phase identification, but the large data sets have, in the past, proved too large to efficiently analyze. In the present work, we describe the application of a new automated, unbiased, multivariate statistical analysis technique to very large X-ray spectral image data sets. The method, based in part on principal components analysis, returns physically accurate (all positive) component spectra and images in a few minutes on a standard personal computer. The efficacy of the technique for microanalysis is illustrated by the analysis of complex multi-phase materials, particulates, a diffusion couple, and a single-pixel-detection problem.

306 citations


Book ChapterDOI
17 Aug 2003
TL;DR: A very practical ciphertext-only cryptanalysis of GSM encrypted communication, and various active attacks on the GSM protocols, which allow attackers to tap conversations and decrypt them either in real-time, or at any later time.
Abstract: In this paper we present a very practical ciphertext-only cryptanalysis of GSM encrypted communication, and various active attacks on the GSM protocols. These attacks can even break into GSM networks that use “unbreakable” ciphers. We describe a ciphertext-only attack on A5/2 that requires a few dozen milliseconds of encrypted off-the-air cellular conversation and finds the correct key in less than a second on a personal computer. We then extend this attack to a (more complex) ciphertext-only attack on A5/1. We describe new attacks on the protocols of networks that use A5/1, A5/3, or even GPRS. These attacks are based on security flaws of the GSM protocols, and work whenever the mobile phone supports A5/2. We emphasize that these attacks are on the protocols, and are thus applicable whenever the cellular phone supports a weak cipher, for instance they are also applicable using the cryptanalysis of A5/1. Unlike previous attacks on GSM that require unrealistic information, like long known plaintext periods, our attacks are very practical and do not require any knowledge of the content of the conversation. These attacks allow attackers to tap conversations and decrypt them either in real-time, or at any later time. We also show active attacks, such as call hijacking, altering of data messages and call theft.

280 citations


Journal ArticleDOI
TL;DR: Firm profitability in this industry apparently benefits from new product introductions because new products need less marketing support than older products, and firms decrease their advertising intensity in the wake of a new product introduction.
Abstract: Based on data from firms in the personal computer industry, we study the effect of new product introductions on three key drivers of firm value: profit rate, profit-rate persistence, and firm size as reflected in asset growth. Consistent with our theoretical development, we find that new product introductions influence profit rate and size; however, we find no effect on profit-rate persistence. Interestingly, we also find that the effect of new product introductions on profit rate stems from a reduction in selling and general administrative expenditure intensity rather than through an increase in gross operating return. Notably, firms decrease their advertising intensity in the wake of a new product introduction. Firm profitability in this industry apparently benefits from new product introductions because new products need less marketing support than older products.

245 citations


Journal ArticleDOI
TL;DR: In this article, a model was developed and estimated to explain global inter-country differences in Internet usage rates (IURs), as measured by users per capita, and the relationship appears to be non-linear, with income differences having greater impacts on IUR at lower than higher levels.

218 citations


Patent
23 May 2003
TL;DR: Personal information of a user is provided to an information provider from any location, through a simple apparatus, and with reliability as discussed by the authors, where personal information is stored beforehand in a user profile database of a server.
Abstract: Personal information of a user is provided to an information provider from any location, through a simple apparatus, and with reliability. Personal information is stored beforehand in a user profile database of a server. When the user accesses a service provider device from a terminal device through the server and the Internet, the service provider device requests the terminal device to enter the personal information of that user. The server reads the requested personal information from the user profile database and transfers the personal information from a proxy device to the service provider device. This novel arrangement makes it unnecessary for the terminal device to input the personal information on its own. This holds true the a personal computer.

Journal ArticleDOI
TL;DR: The ways in which computer games contravene Nielsen's guidelines for heuristic evaluation and how these contraventions impact on flow are considered, which takes important initial steps towards defining how flow in computer games can inform affective design.
Abstract: It is proposed that games, which are designed to generate positive affect, are most successful when they facilitate flow (Csikszentmihalyi 1992). Flow is a state of concentration, deep enjoyment, and total absorption in an activity. The study of games, and a resulting understanding of flow in games can inform the design of non-leisure software for positive affect. The paper considers the ways in which computer games contravene Nielsen's guidelines for heuristic evaluation (Nielsen and Molich 1990) and how these contraventions impact on flow. The paper also explores the implications for research that stem from the differences between games played on a personal computer and games played on a dedicated console. This research takes important initial steps towards defining how flow in computer games can inform affective design.

Journal Article
TL;DR: A very practical ciphertext-only cryptanalysis of GSM encrypted communication, and various active attacks on the GSM protocols, which allow attackers to tap conversations and decrypt them either in real-time, or at any later time.
Abstract: In this paper we present a very practical ciphertext-only cryptanalysis of GSM encrypted communication, and various active attacks on the GSM protocols. These attacks can even break into GSM networks that use unbreakable ciphers. We describe a ciphertext-only attack on A5/2 that requires a few dozen milliseconds of encrypted off-the-air cellular conversation and finds the correct key in less than a second on a personal computer. We then extend this attack to a (more complex) ciphertext-only attack on A5/1. We describe new attacks on the protocols of networks that use A5/1, A5/3, or even GPRS. These attacks are based on security flaws of the GSM protocols, and work whenever the mobile phone supports A5/2. We emphasize that these attacks are on the protocols, and are thus applicable whenever the cellular phone supports a weak cipher, for instance they are also applicable using the cryptanalysis of A5/1. Unlike previous attacks on GSM that require unrealistic information, like long known plaintext periods, our attacks are very practical and do not require any knowledge of the content of the conversation. These attacks allow attackers to tap conversations and decrypt them either in real-time, or at any later time. We also show active attacks, such as call hijacking, altering of data messages and call theft.

Journal ArticleDOI
TL;DR: A novel linear programming (LP) based approach for efficiently solving the intensity modulated radiation therapy (IMRT) fluence-map optimization (FMO) problem to global optimality by approximating any convex objective function by a piecewise linear convex function.
Abstract: We present a novel linear programming (LP) based approach for efficiently solving the intensity modulated radiation therapy (IMRT) fluence-map optimization (FMO) problem to global optimality. Our model overcomes the apparent limitations of a linear-programming approach by approximating any convex objective function by a piecewise linear convex function. This approach allows us to retain the flexibility offered by general convex objective functions, while allowing us to formulate the FMO problem as a LP problem. In addition, a novel type of partial-volume constraint that bounds the tail averages of the differential dose-volume histograms of structures is imposed while retaining linearity as an alternative approach to improve dose homogeneity in the target volumes, and to attempt to spare as many critical structures as possible. The goal of this work is to develop a very rapid global optimization approach that finds high quality dose distributions. Implementation of this model has demonstrated excellent results. We found globally optimal solutions for eight 7-beam head-and-neck cases in less than 3 min of computational time on a single processor personal computer without the use of partial-volume constraints. Adding such constraints increased the running times by a factor of 2-3, but improved the sparing of critical structures. All cases demonstrated excellent target coverage (> 95%), target homogeneity (< 10% overdosing and < 7% underdosing) and organ sparing using at least one of the two models.

Journal ArticleDOI
01 Oct 2003-Stroke
TL;DR: The National Institutes of Health Stroke Scale can be reliably performed over the REACH system and supports the endeavor to bring stroke expertise to rural community hospitals.
Abstract: Background and Purpose— Despite Food and Drug Administration approval of tissue-type plasminogen activator for stroke, obstacles in the US healthcare system prevent its widespread use. The Remote Evaluation for Acute Ischemic Stroke (REACH) program was developed to address these issues in rural settings. A key component of stroke assessment in the REACH system is the National Institutes of Health Stroke Scale (NIHSS) evaluation. We sought to determine whether, using the REACH system, NIHSS values of bedside and remote evaluators would correspond. Methods— Twenty patients were recruited. On obtaining consent, a neurologist performed a bedside NIHSS evaluation on each patient. Within 1 hour, using any broadband-connected workstation—either office or home personal computer and a landline phone to speak with the patient—a second neurologist remotely evaluated the patient through the REACH system. Paired t tests and Pearson correlation coefficients were used to examine NIHSS reliability performed bedside and r...

Patent
22 Nov 2003
TL;DR: In this article, the ExpressCard has an ExpressCard connector that plugs into a host, such as a personal computer, digital camera, or personal digital assistant (PDA), and the controller chip on the Expresscard uses a pair of differential Universal Serial-Bus (USB) data lines in the connector to communicate with the host.
Abstract: An ExpressCard contains flash memory. The ExpressCard has an ExpressCard connector that plugs into a host, such as a personal computer, digital camera, or personal digital assistant (PDA). A controller chip on the ExpressCard uses a pair of differential Universal-Serial-Bus (USB) data lines in the connector to communicate with the USB host, or can use PCI Express, Firewire, or other protocols. One or more flash-memory chips on the ExpressCard are controlled by a flash-memory controller in the controller chip. Two or more channels of a flash bus have a shared control bus but separate ready lines. The separate ready lines allow flash-memory chips in the two channels to finish operations at different times.

Journal ArticleDOI
01 Dec 2003-Stroke
TL;DR: Remote examination of acute stroke patients with a computer-based telesupport system is feasible and reliable when applied in the emergency room; interrater agreement was good to excellent in all items.
Abstract: Background and Purpose— In acute stroke care, rapid but careful evaluation of patients is mandatory but requires an experienced stroke neurologist. Telemedicine offers the possibility of bringing such expertise quickly to more patients. This study tested for the first time whether remote video examination is feasible and reliable when applied in emergency stroke care using the National Institutes of Health Stroke Scale (NIHSS). Methods— We used a novel multimedia telesupport system for transfer of real-time video sequences and audio data. The remote examiner could direct the set-top camera and zoom from distant overviews to close-ups from the personal computer in his office. Acute stroke patients admitted to our stroke unit were examined on admission in the emergency room. Standardized examination was performed by use of the NIHSS (German version) via telemedicine and compared with bedside application. Results— In this pilot study, 41 patients were examined. Total examination time was 11.4 minutes on aver...

Journal ArticleDOI
TL;DR: The findings of this study showed that PC use increased risk of developing musculoskeletal disorders (WMSd-H and WMSD-UE).

Patent
Andrew T. Wilson1
10 Oct 2003
TL;DR: In this article, a hand-held housing with a memory for storing coded audio event data, a mechanism for downloading into the memory coded audio events and digital-audio electronics for retrieving coded audio data from memory, converting it to an audio signal and playing it out.
Abstract: The apparatus involves a hand-held housing with a memory for storing coded audio event data, a mechanism for downloading into the memory coded audio event data and digital-audio electronics for retrieving coded audio event data from memory, converting it to an audio signal and playing it out. In one disclosed embodiment of the invention, the data are stored in accordance with a musical instrument digital interface (MIDI) standard, and may be created on an appropriately equipped personal computer (PC). The capacity of such a hand-held device is far greater than if the data were conventionally digitized or coded. A wirelessly networked system of such music devices in physical proximity is disclosed that enables audio score synthesis and mixing by at least one such device of a synthesized score and an inputted score for outplay to others in a real-time musical jam or music-sharing session.

Patent
20 Mar 2003
TL;DR: In this paper, a temperature measurement subject mount device (1) is mounted on a measurement subject, which is in the form of a pliable sheet with one lateral surface being viscous and with a hole formed therein, has a temperature data detection means for detecting the temperature inside the hole.
Abstract: A temperature measuring device that allows even old persons, babies and little children or infants to obtain a correct clinical temperature value and that can be constructed as a disposable type as the need arises and makes correct temperature measurement possible in real time; and a temperature measuring method. A temperature measurement subject mount device (1) to be mounted on a temperature measurement subject, which is in the form of a pliable sheet with one lateral surface being viscous and with a hole formed therein, has a temperature data detection means for detecting the temperature inside the hole, power being supplied by receiving electric waves from a reader 2 that is an outside device, such power being used for temperature measurement in the temperature measurement subject mount device (1), the measurement result being sent by electric waves as the temperature measurement subject temperature and ID data to the reader 2. The reader 2 is constructed to be connectible to an unillustrated personal computer, in which data processing is effected as the need arises.

Patent
30 May 2003
TL;DR: A local proxy in a home network may identify the device class to which a particular device in the home network belongs based on the receipt of a message requesting a network address for use by the device as mentioned in this paper.
Abstract: A local proxy in a home network may identify the device class to which a particular device in the home network belongs based on the receipt of a message requesting a network address for use by the device. A device class may include a broad category to describe the device (such as, a gaming device, a personal computer, an appliance, or a PDA), the type of platform (e.g., the type of hardware, such as a Macintosh™ personal computer, a Windows™-based personal computer, a Linux™-based personal computer, a PDA, a home appliance, or an entertainment device), and/or the operating environment (e.g., operating system type and/or version). The local proxy associates the device class with the device. The local proxy may process a request from a device in a home network based on the device class of the device that sent the request. For example, access to a game available on the home network may be restricted to a gaming device or personal computer. Access to financial information stored on the home network may be restricted by a computing device capable of processing financial information, such as a personal digital assistant or personal computer.

Patent
22 Aug 2003
TL;DR: In this article, a case that allows a user to selectively position a display screen of a tablet personal computer by rotation coupled with angular support is presented. But the case is easily adapted for use with many types and models of personal electronic devices and may be utilized to view the display screen in a plurality of orientations.
Abstract: A carrying case for an electronic device, such as a tablet personal computer, is provided, and more specifically a case that allows a user to selectively position a display screen of the tablet personal computer by rotation coupled with angular support. The case is easily adapted for use with many types and models of personal electronic devices and may be utilized to view the display screen in a plurality of orientations.

Journal ArticleDOI
TL;DR: Preliminary picosecond TRIR studies are presented and it is demonstrated how a combination of TRIR and TR3 spectroscopy can provide key information for the full elucidation of a photochemical process.
Abstract: We have constructed a broadband ultrafast time-resolved infrared (TRIR) spectrometer and incorporated it into our existing time-resolved spectroscopy apparatus, thus creating a single instrument capable of performing the complementary techniques of femto-/picosecond time-resolved resonance Raman (TR3), fluorescence, and UV/visible/infrared transient absorption spectroscopy. The TRIR spectrometer employs broadband (150 fs, approximately 150 cm(-1) FWHM) mid-infrared probe and reference pulses (generated by difference frequency mixing of near-infrared pulses in type I AgGaS2), which are dispersed over two 64-element linear infrared array detectors (HgCdTe). These are coupled via custom-built data acquisition electronics to a personal computer for data processing. This data acquisition system performs signal handling on a shot-by-shot basis at the 1 kHz repetition rate of the pulsed laser system. The combination of real-time signal processing and the ability to normalize each probe and reference pulse has enabled us to achieve a high sensitivity on the order of deltaOD approximately 10(-4) - 10(-5) with 1 min of acquisition time. We present preliminary picosecond TRIR studies using this spectrometer and also demonstrate how a combination of TRIR and TR3 spectroscopy can provide key information for the full elucidation of a photochemical process.

Patent
Douglas Deeds1
18 Nov 2003
TL;DR: In this paper, a ring tune enhanced to provide incoming call information to the subscriber is presented. But the ring tune enhancement may include temporarily compounding the ring tunes, tonal or stylistic enhancement, applying compound accompaniment, or applying tempo variation.
Abstract: A manner of providing ring-tune alerts to announce the arrival of incoming communications at a communication device such as a mobile station operable in a wireless communication network. When notification an incoming communication arrives at the mobile station, the mobile station detects the type and origin of the communication and then composes a ring tune enhanced to provide incoming call information to the subscriber. The enhancement may include temporarily compounding the ring tune, tonal or stylistic enhancement, applying compound accompaniment, or applying tempo variation. The ring-tune components may be installed by the manufacturer or distributor of the instrument, or may be downloaded by the subscriber. The communication device may also be a personal computer operable to communicate through a communication network such as the Internet.

Journal ArticleDOI
TL;DR: Qualitative and quantitative data from the study support PAINReportIt as a feasible method for patients to self-report their pain and improve directions and practice screens would likely improve patients' independence in completing PAIN reportIt.

Patent
14 Jul 2003
TL;DR: In this paper, a method, system, and apparatus for visually displaying digitized information in a way that allows a human operator to detect easily patterns and characteristics within the data is presented.
Abstract: The present invention is a method, system, and apparatus for visually displaying digitized information in a way that allows a human operator to detect easily patterns and characteristics within the data A personal computer is used to extract raw data and to perform Boolean operations at the behest of a user The manipulated information is then converted into a false-color image and displayed on an output screen The images can be compared to known data, called a template, in order to detect one or more desired patterns that indicate desirable features The desired pattern can then be highlighted (or illuminated) and be displayed to the operator so that the location of the desired feature may be identified

Journal ArticleDOI
TL;DR: A portable system tailored to monitoring neuronal extracellular potentials that readily incorporates standardized microelectrode arrays developed by and in use at the University of North Texas is described.

Patent
23 May 2003
TL;DR: In this article, the authors present a system and method for controlling whether a user may access certain Internet sites when using a computer, which is carried out on a personal computer having a local ratings cache, cache refresher, local ratings interpreter and an allow-block list.
Abstract: The present invention provides a system and method for controlling whether a user may access certain Internet sites when using a computer. The system and method are carried out on a personal computer having a local ratings cache, a cache refresher, a local ratings interpreter and an allow-block list. When the computer user attempts to access an Internet site referenced by a specified Uniform Resource Locator (“URL”), the invention determines whether the URL is referenced on the allow-block list and, if so, allows or disallows access to the site referenced by the URL accordingly. If the URL is not referenced on the allow-block list, the invention obtains a content category from either the local ratings cache or, if not contained therein, a ratings service. If the content category may be viewed by a person in the user's age group, as determined by reference to an age group map cross-referencing age group to permissibly viewable categories for each such age group, the local ratings interpreter permits access to the Internet site referenced by the specified URL; otherwise, access is not allowed. A copy of the settings for the user, such as the age group, the allow-block list and the age group map, are stored on a content settings service so that the user's settings can be accessed and used on any computer the user is operating.

Journal ArticleDOI
TL;DR: In this article, a fast method was developed for solution of the Richards equation for water transport in the Brooks-Corey soil hydraulic property descriptions with water content as the dependent variable in unsaturated regions and pressure head in saturated regions.
Abstract: Modeling of water and solute transport in soils is increasingly important in hydrology and agriculture, but there remain many gaps and unresolved issues. One of these, the speed and robustness of numerical solutions, is important in large-scale and stochastic modeling. A fast method was developed for solution of the Richards equation for water transport. Brooks-Corey soil hydraulic property descriptions were used with water content as the dependent variable in unsaturated regions and pressure head in saturated regions. Central time weighting was used in unsaturated conditions to improve accuracy and fully implicit weighting in saturated conditions to improve stability. Water fluxes were calculated using matric flux potentials combined with a novel spatial weighting scheme for the gravitational component. Flow across soil property interfaces was calculated by equating fluxes to and from the interface. Results on a test problem involving rainfall, surface ponding, evaporation, and drainage over 400 h showed the new method to be an order of magnitude faster and more robust than an iterative scheme typifying current practice. Execution time for the test problem with <3% error was 0.006 s on a 166-MHz personal computer. Solutions for solute transport described by the advection-dispersion equation were obtained concurrently without substantial increase in execution time by assuming average water fluxes over several steps of the water transport solution. The methods presented here should also be applicable to two- and three-dimensional problems.

Book
10 Jun 2003
TL;DR: Introduction to Data Acquisition & Control Analog and Digital Signals Signal Conditioning The Personal Computer for Real Time Work Plug-in Data Acquisition Boards Serial Data Communications Distributed & Standalone Loggers/Controllers IEEE 488 Standard Ethernet & LAN Systems
Abstract: Introduction to Data Acquisition & Control Analog and Digital Signals Signal Conditioning The Personal Computer for Real Time Work Plug-in Data Acquisition Boards Serial Data Communications Distributed & Standalone Loggers/Controllers IEEE 488 Standard Ethernet & LAN Systems The Universal Serial Bus (USB) Specific Techniques The PCMCIA Card Appendix A: Glossary Appendix B: IBM PC Bus Specifications Appendix C: Review of the Intel 8255 PPI Chip Appendix D: Review of the Intel 8254 Timer-Counter Chip Appendix E: Thermocouple Tables Appendix F: Numbers Systems Appendix G: GPIB (IEEE-488) Mnemonics & their Definition Appendix H: Practical Laboratories & Demonstrations Appendix I: Command Structure & Programming.