Computing and calculating and counting (G06)

G   Physics(391283)
G06            Computing; calculating; counting(53983)

Plastic keychain with full-colour printing, equipped with built-in rfid-tag, and method of its manufacture // 2629143
FIELD: physics.SUBSTANCE: plastic keychain is made with full-colour printing and is equipped with a built-in RFID-tag, made in a rectangular shape and has a through circular hole for the ring. The corners of the keychain are rounded, and the three corners of the keychain have one radius, and the fourth one differs from them. The keychain consists of successively combined layers of plastic laminate, a decorative-information layer of the front side, a central preliminate with, at least, one RFID-tag installed, a decorative-information layer of the back side, a plastic laminate forming the base together, and on both sides there is a layer of glue and a composite lens. The method of manufacturing a plastic keychain is that first a central preliminate is formed, then a multilayered structure is formed, the basis for which on both sides of the central preliminate is laid along the information-decorative sheet and the protective laminating layer. Then, all the sheets are joined together thermocompressively, a plurality of, for example, 24, 48, 72 or more, cutout blanks with through circular holes each, are cut from the resulting multi-layer structure, but the keychains are kept on the base. Then all the blanks are covered on one side with a liquid material based on polyurethane, then on the other side, then the multilayer sheet with the blanks is dried, and the finished keychains are removed from the base and packaged.EFFECT: creating a device that performs the function of a keychain and a contactless smart-card, increasing its resistance to physical stresses arising in everyday use, increasing resistance to changes in the temperature of the environment of use, to ultraviolet radiation due to the materials used in the device, and improving ergonomics and ease of use of the device, the method allows to automate the process of manufacturing keychains.17 cl, 1 dwg

ethod of optimizing the efficiency of drilling with reduction of step-like supply // 2629029
FIELD: mining.SUBSTANCE: method and control system includes the solution of one or more optimisation tasks containing the objective function. The objective function may depend on conditions including the physical model of the drilling system. The objective function can be minimized without resorting to the model, but by referring to the calculated hopping frequency based on the angular velocity profile of the drill bit. Additionally, actual downhole measurements for use in the method and control system, such as the angular velocity of the drill bit, can be calculated using an observation unit.EFFECT: reducing or eliminating step-like supply and vibrations in the well.26 cl, 6 dwg

Operation mode switching device // 2628995
FIELD: physics.SUBSTANCE: operation mode switching device is configured to communicate with an automatic door including a door controller having an operation mode control unit for changing the operation mode of the automatic door from one to the other and a transmitter/receiver unit for communicating with the operation mode switching device. The operation mode switching device comprises a display for displaying a main screen, in which an icon indicating the current operation mode of the automatic door is provided, and for displaying an operation mode selection screen, in which a plurality of operation modes are presented for selection. Also, the operation mode switching device comprises a control unit including a command configuring unit and a pictogram display control unit and an operation unit that allows the switching device user to select one of a plurality of operation modes on the display operation mode selecting screen and to transmit an output signal corresponding to the selected operation mode, to the command configuring unit and to the pictogram display control unit. Moreover, the command configuring unit generates a command in response to the output signal transmitted from the operation unit and transmits the command to the operation mode control unit through the transmitter/receiver units to change the operation mode of the automatic door. The pictogram display control unit controls the display to provide a pictogram indicating the selected operation mode corresponding to the output signal transmitted from the operation unit in colour on the main screen.EFFECT: increasing the signal transmission rate.14 cl, 19 dwg, 1 tbl

System of providing systematization, ordering, distribution, processing and working with content of library system // 2628992
FIELD: information technology.SUBSTANCE: system contains the means of interaction, which are internet resources and mobile applications for the technical means of the user's work, and also technical means of processing information and means of storing the content. The technical information processing means include a system core comprising a content processing and management module, a license management module, a statistics processing module, a content delivery preparation module, a delivery mapping module, a rating processing module, and means for storing content information and data for its administering and controlling access to the core modules.EFFECT: expansion of tools for processing content, marketing tools, expansion of the arsenal of means for the same purpose.16 cl, 2 dwg

System and method for protected transmission of audio-data from microphone to processes // 2628925
FIELD: physics.SUBSTANCE: protected audio data transmission system from the microphone to the processes comprises: a computing device comprising: at least, one processor; input and output means interacting with, at least, one processor; and a storage means comprising an operating system, a plurality of instructions executable on, at least, one processor, and a protected audio data transmission subsystem. The operating system includes an audio subsystem comprising: an audio stream management facility, with which API-functions interact with processes for creating and managing audio streams associated with the audio stream mixing and processing facility; audio mixing and processing means for processing audio streams using Audio Processing Objects (APOs), and also routing audio streams between processes and the end device that is a microphone, during which audio data are transmitted from the said microphone to processes by separate buffers, wherein the said audio mixing and processing means records audio data, and processes read the said audio data by calling an API-functions. The protected audio data transmission subsystem comprises: an RPC-traffic filtering means for monitoring RPC-traffic between the audio stream management and the audio mixing and processing means for detecting RPC-requests for creating audio streams associated with the final audio device being a microphone and for determining process identifiers, for which the creation of audio streams is required, associated with the cryptographic protection of audio streams; an audio cryptographic protection means for encrypting audio data within the audio processing and mixing means of the audio processing means (Audio Processing Objects, APOs), also intended to install interceptors of the API-function call, by which processes are reading the audio data from separate buffers used by means of mixing and processing audio streams for the transfer of audio data from a target device that is a microphone, for processes, where the interceptors are set for processes, an identity that was defined by means of the RPC-traffic filtration and is also intended to decrypt audio data and transfer the decrypted audio data to the processes.EFFECT: protecting audio data transmitted from the microphone to the processes, from interception.14 cl, 7 dwg

System and method of data protection, while the mobile device is interacting with computer // 2628924
FIELD: information technology.SUBSTANCE: method of computer checking for the mobile device connection security is disclosed, followed by the formation of the data transfer mode between the devices in which: the mobile device is connected to the computer using the security adapter; determine if there is the request from the computer to connect to the mobile device for data exchange or not; send the request to the mobile device to determine the security level; collect the environment parameters; determine the security level, based on the collected parameters of the environment; determine the number of new requests to connect to the mobile device, while waiting for the security level from the mobile device; select the rule to generate the data transfer mode between the mobile device and the computer; form the data transfer mode according to the selected rule.EFFECT: user data protection, when the mobile device is connected to the computer by checking the computer for secure connection of the mobile device with the data transfer mode subsequent formation.19 cl, 5 dwg

System and method of distribution of files between virtual machines entering distributed system of virtual machines to implement anti-virus check // 2628923
FIELD: information technology.SUBSTANCE: system contains a "protected virtual machine" that interacts with two "virtual defense machines", while the "protected virtual machine" contains a task creation tool; means of collection; means of calculating dynamics; means for selecting the "virtual protection machine" based on the obtained dependence of the effectiveness of the anti-virus scan; determining the time for the start of the anti-virus scan so that the anti-virus scan is completed no later than the set time and at least one of the criteria is fulfilled - the anti-virus scan takes the shortest time; anti-virus scanning takes less time than specified; a minimum amount of computing resources is required to perform an anti-virus scan; for performing an anti-virus scan, the computing resources are less than the specified; transfer information about the selected "virtual protection machine", which contains the most effective time for starting the anti-virus scan.EFFECT: reducing the use of the total computing resources of virtual machines during an anti-virus scan.8 cl, 5 dwg

ethod for determining similarity of composite files // 2628922
FIELD: physics.SUBSTANCE: method for determining the similarity of composite files contains the steps of: a) determining by means of the calculation tool, whether the first file is a compound file; b) allocating the first set of attributes from the header of the first composite file by means of the calculation tool, if it was determined in the previous step that the first file is composite; c) allocating the second set of attributes from, at least, one directory entry of the first composite file by means of the calculation tool, if it was determined in the previous step that the first file is composite; d) calculating the hash of the first composite file using the first and the second set of attributes by means of the calculation tool; e) performing a-d steps for the second composite file; f) recognizing the first and the second compound files to be similar by means of the calculation tool, if the calculated file hashes are the same.EFFECT: detecting similar compound files, which is achieved by recognizing composite files to be similar, if the calculated hashes of compound files are the same.7 cl, 4 dwg

System and method for performing anti-virus scan of file on virtual machine // 2628921
FIELD: information technology.SUBSTANCE: computer-implemented method for performing an anti-virus scan of a file on a virtual machine in which: a file in a virtual machine is executed with successive entry of API function calls and entry of internal events into the first log, the first type signature from the database of first type signatures is identified from the first log, re-execution of the file is performed on the virtual machine with entries of internal events in the second log. After that, the second type signature is identified in the second log from the second type signature database and the criterion for making entries about the API function calls based on the second and the first logs is determined, the third execution of the file is made on the virtual machine, adding only internal events to the third log, as long as the criterion for entering records about API function calls, after which records are made about API function calls, is not performed, an anti-virus scan of the file is performed by identifying in the third log a malicious signature using database of malicious signatures, the file will be considered malicious when a malicious signature is detected in the third log.EFFECT: detecting a malicious file containing program code that makes it difficult to detect this malicious file when executing a file on a virtual machine.40 cl, 3 tbl, 6 dwg

ethod for detecting harmful assemblies // 2628920
FIELD: information technology.SUBSTANCE: method for detecting a harmful image of machine code, where harmful code is considered to be an image of machine code which execution logic of the machine code differs from the execution logic of the CIL code of the parent assembly, contains the steps: a) obtain the image of the machine code; B) define the parent assembly, where the parent assembly is the assembly on the basis of which the resulting image was created; C) establish a discrepancy between the execution logic of the machine code of the obtained image of the machine code and the execution logic of the CIL code of the specific parent assembly; D) recognize the image of the machine code as harmful on the basis of the established discrepancy between the execution logic of the machine code of the obtained image of the machine code and the execution logic of the CIL code of the specific parent assembly.EFFECT: increase the security of the device by detecting a harmful image of a machine code.6 cl, 9 dwg

System and method of detecting harmful files on distributed system of virtual machines // 2628919
FIELD: information technology.SUBSTANCE: method is implemented by using the system for performing anti-virus scanning of files on virtual machines. The system includes: a "protected virtual machine" that interacts with two "virtual defense machines". For the "virtual defense machines", an approximate effectiveness dependence of the anti-virus scanning is determined, on the basis of which a particular "virtual protection machine" is selected, for which the time for the start of the anti-virus scanning of files received from the "virtual protection machine" is determined.EFFECT: increasing the performance speed of anti-virus scanning of files by distributing files intended for performing anti-virus scanning on the virtual machines.14 cl, 3 dwg

ethod and system of controlling stationary camera // 2628916
FIELD: physics.SUBSTANCE: method of controlling a stationary camera of machine vision fixing transport vehicles (TV) is provided, comprising the steps of: activating the first mode of the camera operation, in which the camera is adjusted over a fixed area of the frame visible by the camera; carrying out the TV fixation; in response to the TV fixation, the second mode of the camera operation is activated, in which a set of image frames of areas identifying the state registration sign (SRS) of the TV is received for a certain period of time; extracting the SRS areas from the resulting set of image frames; combining all the images of the SRS areas; building a histogram of the grey colour distribution based on the image of the united SRS areas received for the said time period; determining the characteristics of the colour distribution of the SRS areas based on the aforementioned histogram, calibrating the camera based on the received characteristics of the colour distribution of the SRS areas.EFFECT: increasing the accuracy of object recognition.3 cl, 2 dwg

ethod of detecting remote attacks on automated control systems // 2628913
FIELD: radio engineering, communication.SUBSTANCE: in the method, the initial graph of the communication network is formed, reflecting the topology and structure of the communication network, the set of N reference packets is stored, the log of the processed traffic is created on each routing node of the specified network, and when the k-th message packet passes its header is stored in the log, check the incoming data packets for compliance with the specified rules and in accordance with them make a conclusion about the presence of an attack, record the time of its detection and send a formalized request to all nodes of the network, the comparison operation on the routing nodes of the information from the logs with the received query is obtained, a formalized response is received from the routing nodes, a variational series of the packet transit times with the detected attack attributes and the corresponding route of malicious traffic through the network are constructed, the first node of the variational series is identified as a node, the subscriber of which is the source of a remote attack.EFFECT: increase the reliability of detection of the source of remote computer attacks.5 dwg

Computer for interference compensation // 2628907
FIELD: physics.SUBSTANCE: computer for interference compensation includes the first and the second delay units, a weighting unit, the first and the second complex multipliers, a weight unit, a complex adder, a complex conjugation unit, a switching unit, an accuracy unit, a switching unit, a two-channel switch and a synchronizer interconnected in a certain way.EFFECT: increasing the signal extraction efficiency of moving targets.11 dwg

Coordination mechanism for cloud choice // 2628902
FIELD: information technology.SUBSTANCE: method for distributing the load across one or more public computer networks is implemented. A request for the accounting information update, issued by the user of a private corporate network, is received and then identified using a coordination tool, a target computer network from the one or more public computer networks. Said one or two commands are converted into a format compatible with the rule language that is followed by the target computer network when interacting with an external source. The distribution of these one or more converted commands is initiated over the computing resources associated with the target computer network that are intended to perform the said accounting information update.EFFECT: automatic selection of a public cloud that satisfies a set of criteria defined by administrators, and ensuring simplified interaction with the selected public cloud.20 cl, 8 dwg

ethod of estimation of degree of influence of anti-virus software on quality of functioning of information computing systems // 2628899
FIELD: information technology.SUBSTANCE: method for assessing the degree of influence of antivirus software on the performance of information and computing systems includes the step of assessing the performance degradation of the information and computing system in solving tasks assigned to the system during which the measurement and determination of time or quantity indicators of the decrease in the performance of information-computer systems for each task, solved by the information and computing system, at the same time it is additionally introduced tap valuation obtained in the first stage productivity decrease values which are performed during the transition from the indices obtained in the first step, to reduce the dimensionless coefficient of performance for each of the tasks assigned to the information and computing system; the stage of assessing the level of significance of tasks assigned to the information and computing system, during which, by expert assessments, using the paired comparisons method, determine the importance factors for each of the tasks solved by the information and computing system; stage of the overall assessment of the degree of influence of the anti-virus software on the information and computing system, during which the overall indicator of the performance of the information and computing system is calculated taking into account the importance factors of each task assigned to the information and computing system.EFFECT: reducing the time for building information and computing systems when equipping these systems with antivirus software to protect against computer viruses and malware.3 dwg

ethod of classifiying texts received as result of speech recognition // 2628897
FIELD: physics.SUBSTANCE: method of classifying the text includes the initial creation of a semantic dictionary in the form of a repository of semantic characteristics of words. Then the spoken language is recognized, and the text is received. In the result of the spoken language recognition, each word is selected in the text. A plurality of semantic characteristics in the semantic dictionary is found for each selected word. On the basis of the identified plurality of the semantic characteristics, the semantic consistency of, at least, one word sequence is determined to obtain a phrase. A plurality of phrases is selected from the text with a comparison of their semantic characteristics and the selection of the results of comparison of the dominant semantic characteristics. A plurality of phrases is converted into a plurality of key phrases containing a dominant semantic characteristic. A class is formed from the first received key phrases and their semantic characteristics.EFFECT: increasing the accuracy of classifying the text files obtained as a result of recognizing speech in the telephone communication.4 dwg, 1 tbl

ethod of control of integrity of data in information computing systems // 2628894
FIELD: information technology.SUBSTANCE: invention relates to the field of data integrity control in information and computing systems. In the process of functioning of the information-computational system, only those objects of the file system that can be potentially changed are monitored, only in those moments when these objects are opened to perform with them any actions that may violate the integrity of these objects. This helps reduce the input flow of monitored file system objects.EFFECT: reducing the resource intensity of data integrity control.2 dwg

Device for majoritary selection of signals // 2628890
FIELD: physics.SUBSTANCE: device for the majority selection of signals contains n information inputs 11 - 1n, the first and second groups of AND elements 2 and 3, which contain n elements AND 21 - 2n and 31 - 3n, a group of OR elements 4, which contains n+2 elements 41 - 4n+2, n+1 delay elements 51 - 5n+1, n+2 elements of NOT 61 - 6n+2, the first trigger 7, the second trigger 8, the reversible binary counter 9, the launch input 10, the first output of the device 11, the second output of the device 12, the third output of the device 13, the readiness output of the result 14, the third trigger 15.EFFECT: reducing the complexity of the device and increasing its speed.1 dwg, 1 tbl

Systems and methods of decreasing transit sites related to the nuclear system // 2628665
FIELD: information technology.SUBSTANCE: helmet display for playing a game through the gaming cloud system contains a communication circuit for receiving and transmitting interactive media data associated with the gaming program over the network. Interactive media data is processed with the help of the gaming cloud system and transmitted directly to the communication circuit of the helmet display; user input circuit for receiving an action from a user to generate an input signal including the position and motion detected by the user input circuit; and a game data processing circuit for decoding interactive media data received from the network. The game data processing circuit is configured to control the interactivity portion associated with the game program, wherein the interactivity portion is generated based on the input signal.EFFECT: decreasing the number of transit sections of data transmission.21 cl, 9 dwg

ethod and system for goods ordering // 2628585
FIELD: information technology.SUBSTANCE: method for goods ordering and a system based thereon are offered. The system for goods ordering comprises at least one supplier server, at least one main server configured to exchange data with the said supplier servers, and at least one user device configured to exchange data with the said main servers. The system further comprises at least one local server configured to obtain supplier product data and to convert the received supplier product data to a unified data format with formation of unified product data. The main servers are configured to receive the generated product data and to generate consolidated product data based on the received unified product data.EFFECT: user devices are configured to receive the generated consolidated product data and to generate custom order data based on the received consolidated product data.8 cl, 2 dwg

ethod and device for colour adjustment // 2628532
FIELD: physics.SUBSTANCE: method of colour adjustment is proposed, and it comprises: obtaining frame data from a frame buffer; converting the frame data from the original colour space to the linear original colour space by a reverse gamma correction process to obtain the frame data in the linear original colour space; converting the frame data in the linear original colour space to a linear target colour space to obtain frame data in the linear target colour space; and performing gamma correction of the frame data in the linear target colour space using the target gamma coefficient to obtain the frame data in the target colour space.EFFECT: in the invention by performing the inverse data frame gamma correction process from a frame buffer, transformation past inverse gamma correction on frame data in the linear target colour space and performing the frame data to gamma correction in the linear target colour space for receiving the frame data in the target colour space, solved the problem of inconsistent effects display of the same data frame to multiple devices, the effect is realised in accordance to coordinated display and the same data shot on different devices.9 cl, 5 dwg

Body part measurement // 2628497
FIELD: measuring equipment.SUBSTANCE: method comprises production of predetermined definition of a first body part; displaying instructions for measuring, using a mobile device, the first body part according to the predetermined definition on the display of the user's mobile device; applying a sensitive element of the mobile device, that is configured to detect data, including moving or accelerating the mobile device as it moves over the first body part, and determining the total physical displacement of the mobile device movement over the first body part based on the data provided by the first measurement; and searching for an element having a specification corresponding to the first measurement.EFFECT: ensuring tracking the movement of a scanner with 6 degrees of freedom.32 cl, 4 dwg

ethod and device of partial updates // 2628496
FIELD: information technology.SUBSTANCE: social group for partial updates is defined. User accounts in the social group are defined, which are subject to partial updating, including the definition of user accounts with the first activity indicator exceeding the specified first threshold in the social group. Applications that correspond to user accounts are partially updated, in accordance with the specified relationship between user accounts and application identifiers, or software of devices corresponding to user accounts is partially updated, according to the specified relationship between user accounts and devices identifiers. Device applications corresponding to the user accounts, which are subject to be partially updated, are updated by sending the service pack by at least one server to at least one of the devices.EFFECT: reducing errors when updating applications.13 cl, 11 dwg
ethod and device for generating image filter // 2628494
FIELD: physics.SUBSTANCE: method for generating an image filter is proposed. The method comprises the step of obtaining a selected image with a filter effect. Further, according to the method, a group of similar images is obtained by using an image with a filter effect, wherein the group of similar images contains, at least, one similar image with a similar structure, as in the image with the filter effect, but without the filter effect. Further, according to the method, the display ratio for converting the group of similar images to the image with the filter effect is calculated and the display ratio is used as an image filter.EFFECT: increasing the accuracy of the self-defined image filter by converting the group of similar images into the image with the filter effect.7 cl, 6 dwg

ethod, terminal device and server for nfc data transfer // 2628488
FIELD: information technology.SUBSTANCE: method includes obtaining tag data by scanning a pre-created NFC tag. These tags include at least an identification code and information about a third-party service transaction; and generation of order according to the identification code, transaction information, and user information; and sending of order to the server. The order is interpreted by the server to obtain identification code, transaction information and user information, and transaction information and user information are sent to a third-party service provider, corresponding to the identification code, by server to complete the order placement operation.EFFECT: expansion of arsenal of NFC data transfer technical means.16 cl, 7 dwg

ethod of data analysis, data analysis device, data analysis system and media of information // 2628487
FIELD: information technology.SUBSTANCE: distribution information log database is clustered in which characteristic image element of pattern formed on the surface of component is associated with at least one of the product information relating to the product equipped with the component, and distribution information regarding the distribution of the product on the basis of characteristic image element; and analysis, by statistical processing of one or both distribution information and product information associated with the characteristic image element belonging to each group obtained through clustering.EFFECT: providing technology for managing product distribution.20 cl, 14 dwg

Systems and methods of network access // 2628486
FIELD: radio engineering, communication.SUBSTANCE: method performed in the network component comprises the following stages: establishing a control channel with the user equipment (UE), establishing a communication link layer channel by the network component, transmitting the communication link layer channel to the UE via the identifier network component, and communicating via the network component with the UE by the communication link layer channel using the WLAN Control Protocol (WLCP). A wireless local area network (WLAN) contains a trusted WLAN access network (TWAN).EFFECT: establishment of communication and release of session resources in a wireless local area network corresponding to packet data network connections in the improved 3GPP packet core.26 cl, 12 dwg

ethod and device to activate the working condition of the mobile terminal // 2628484
FIELD: information technology.SUBSTANCE: method includes: measuring of the first time interval during which the event of palm contact with the mobile terminal screen lasts; measuring of the second time interval during which the finger touches the screen; and determination whether it is necessary to activate the set operating status on the mobile terminal according to the first time interval and the second time interval.EFFECT: data input speed increase.9 cl, 10 dwg

ethod and device for access control // 2628483
FIELD: information technology.SUBSTANCE: method contains reception of access-request from client to server for Digital Living Network Alliance (DLNA); obtain of MAC address of DLNA client; denial of access to DLNA client, if MAC address is in the blacklist, and search for MAC addresses in a pre-stored relationship of correspondence, if MAC address is not in the black list, to determine whether MAC address in pre-stored relationship of correspondence, that contains relationship of correspondence between different MAC addresses and different keys. Wherein MAC addresses in pre-stored relationship of correspondence represent the MAC addresses of DLNA clients, who once have successfully formed access connection; and determination, if address exists in pre-stored relationship of correspondence MAC, whether to authorise access to DLNA client, according to a key, corresponding to MAC address included in pre-stored relationship of correspondence.EFFECT: preventing malicious access and potential security threats.10 cl, 5 dwg

ethod and device for the firmware compaction, method and device for the firmware unzipping // 2628482
FIELD: information technology.SUBSTANCE: firmware compaction method contains the following steps: collect the code section information and the section with the firmware data; separately compact the code section and the data section; and configurate the first description data, corresponding to the firmware, the first description data contains the first address data as to where the compacted code section in the electronic device is stored, the second address data as to where the compacted data section is stored in the electronic device, the first unzipping address, where the compacted code section is to be unzipped in the electronic device, and the second unzipping address, where the compacted data section is to be unzipped in the electronic device.EFFECT: firmware compaction and unzipping.20 cl, 19 dwg
Image processing device, image processing method, program, print media and recording media // 2628481
FIELD: physics.SUBSTANCE: image processing device is proposed comprising, at least, a storage module and a control module. The storage module includes a filter storage unit for storing a set of an approximation filter without an orientation and a filter bank having a degree or wavelet-frame having a degree set for the approximation filter without any orientation and a plurality of detailed filters with corresponding orientations, an image data storage module to store image data. The control module includes a decomposition module for receiving subband signals by performing decomposition for a plurality of resolutions for image data using a set of an approximation filter without an orientation or a filter bank or a wavelet-frame set for an approximation filter.EFFECT: improving the quality of image processing by using an approximation filter.24 cl, 57 dwg

ethod of estimation of information about system with setup based on adaptive model and device for its implementation // 2628474
FIELD: radio engineering, communication.SUBSTANCE: method for evaluating information about a system with an adaptive model, and a device for implementing it, in which the initial data is written into memory devices as arrays of variables and constant values of information indicators of situations, determine the number of correctly taken decisions and the probability of a correct decision making, determine the time of implementation of decisions and the likelihood of timely implementation of decisions taken, display information about the situation on the screen of the display unit, and analyse the information obtained, reduce the dimensionality of data with the help of factor and correlation analysis, give information indicators for each situation to relative units.EFFECT: raised efficiency of system.2 cl, 2 dwg

ethod and device for sound signal optimisation // 2628473
FIELD: physics.SUBSTANCE: method is used in a terminal comprising at least two sound detecting units and the method includes: determining positions of sound sources around the terminal using at least two sound detecting units, selecting a designated sound source among the corresponding sound sources detected by position determination; determining the sound signal emitted from the designated sound source among the sound signals collected by the terminal in accordance with the spatial position of the designated sound source detected by position determination; and optimizing the volume of the sound signal emitted from the designated sound source. According to the present invention, when collecting sound signals due to selection of the surrounding sound sources and optimisation of the sound signal emitted from the selected sound source, the result of the sound signal detection by the terminal is improved.EFFECT: improved result of the sound detection by the terminal.11 cl, 7 dwg

ethod for information processing // 2628463
FIELD: medicine.SUBSTANCE: devices and a method are provided comprising a contact lens that facilitates collection and/or processing of information related to the measured features. In one aspect, the system may comprise a contact lens with an analyte component. The contact lens may include: a substrate; and a circuit located on or in the substrate. The circuit may include: a plurality of sensors configured to measure corresponding features associated with the contact lens carrier; and a communication component configured to transmit information indicating the measured features. The analytical component can be configured to: receive information indicating the measured features; and generating statistical information based on at least information indicating the measured features.EFFECT: extended range of technical means.13 cl, 9 dwg

System of monitoring of special purpose computers safety // 2628458
FIELD: information technology.SUBSTANCE: system contains a management server, a database server, an administrator work place, radio frequency readers connected to the management server, and radio frequency identification emitters (RFID-tags) installed on the monitored components of computer, readers and tags contain unique electronic identifiers and are linked by a radio frequency channel for information exchange with the ability to monitor the status and location of monitored components. An active RFID-tag is generated on the critical monitored computer component, which generates information about the protected component and its location in this computer, and the monitored component is placed in a closed shielding RF signal housing that blocks the direct communication channel between the tag and the reader in normal closed state of the computer and opens the channel for transmitting information about an attempt to unauthorized access to the protected component at the opening of shielding housing.EFFECT: increasing the efficiency of protecting the computer from unauthorized actions.3 cl, 1 dwg

System and method of information control and presentation // 2628438
FIELD: information technology.SUBSTANCE: near field communication devices to transmit the part of data or data identification include one launch state for the mobile device within the near field communication distance, when the user locates the mobile device at the close range from the near field communication of the near field communication device. The mobile device stores the data transmitted from the near field communication device in the memory of the mobile device, determines when one start state is true, and if one start state is true, controls the mobile device user interface mechanism to present the data stored in the memory device to the user of the mobile device.EFFECT: information control provision and the information representation to the user of the mobile device.17 cl, 34 dwg

Classification of texts on natural language based on semantic signs // 2628436
FIELD: physics.SUBSTANCE: in the method for classifying texts in a natural language, semantico-syntactic analysis of text is carried out in the natural language to create a semantic structure that includes a set of semantic classes. The first semantic class is connected with the first value reflecting the value of some attribute of the semantic class. The second semantic class associated with the first semantic class is identified with the specified semantic relations, and it is connected with the second value reflecting the specified attribute of the semantic class. The second value is determined by applying the specified transformation to the first value. The sign of the text in the natural language is calculated on the basis of the first value and the second value and determined using the classifier model with the help of the calculated attribute of the text correlation degree in the natural language with a specific category from a given set of categories.EFFECT: improving the accuracy of the classification of texts, including in different languages.20 cl, 15 dwg

ethod of distributed treating non-stationary flow of real-time applications in conditions of deficit in heterogeneous computer system resources // 2628432
FIELD: physics.SUBSTANCE: from the previous state of the art, the procedures of cluster analysis and determination of query classes, calculating the resource intensity of the query, assigning the request for processing were used. After the introduction of new procedures for setting the level of service quality, determining the computational complexity of the query, ordering queries in accordance with timeliness, it became possible to perform the operation of a heterogeneous computing system in the event of its overload.EFFECT: increasing the likelihood of servicing requests in the conditions of a deficit in the computer system resources and the presence of denials in the servicing of applications by smoothing the flow of incoming applications by changing the parameters of the service request quality.8 dwg, 1 tbl

Selection of text classifier parameter based on semantic characteristics // 2628431
FIELD: physics.SUBSTANCE: to evaluate the text classifier parameters based on semantic characteristics, the semantic-syntactic text analysis in natural language from the body of texts in natural language is performed using the processing device to create a semantic structure representing a set of semantic classes. The text characteristic in natural language is identified, extracted based on a set of values from a set of the characteristic extraction parameters. The body of texts in natural language is separated into a training data sample including the first set of texts in natural language, and a test sample including the second set of texts in natural language. A set of parameter values is defined for extracting characteristics, taking into account the category of the training sample. The obtained set of parameter values is evaluated for extracting characteristics using the test sample.EFFECT: improving the accuracy of classification results.20 cl, 15 dwg

Vehicle software update system // 2628429
FIELD: information technology.SUBSTANCE: system for software update comprises: a vehicle computing system (VCS); a diagnostic service tool (DST); and a remote global intravehicular information system (GIVIS); wherein DST is designed to generate a recover command for GIVIS; after reception of the mentioned recovery command GIVIS is designed to download and install existing operating system on VCS; VCS is additionally designed to communicate with GIVIS for receiving, for each application, previously installed on this VCS, the most up to date version of the mentioned application, compatible with the operating system; GIVIS is designed to issue a command to the installation of these most up to date versions of applications, compatible with the operating system installed on VCS, record system configuration, which includes versions of all installed applications, as soon as versions of these applications were installed and to upload system configuration received from VCS for each of the vehicle plurality.EFFECT: providing application compatibility during operating system update on the vehicle computing system.4 cl, 7 dwg
Device for searching for minimum value of insensitivity of placement in toroidal systems with directed information transmission // 2628329
FIELD: radio engineering, communication.SUBSTANCE: device contains a matrix of m rows and n columns of elements of a homogeneous medium, n units of counting units, a maximum hold block, an adder, a memory block, a minimum value block containing the coordinate register Z, the coordinate register Y, the coordinate register X, the column counter, the counter Column, level decoder, column decoder, a group of i.j () select triggers, a group of i.j () adder, the first group of AND joins, the second group of AND elements, the intensity adder. The inputs of the array of elements of a homogeneous medium are connected to the device installation input, the information outputs of the elements of the i-th row (i = 1,2,…, m) of the matrix of elements of a homogeneous medium are connected to the i-th information input of the memory block whose output is connected to the information output Device.EFFECT: expanding the scope of the device by introducing means to search for the minimum value of the intensity of placement in toroidal systems with a directional transmission of information by the criterion of minimizing the intensity of processes and data.2 cl, 9 dwg

Systems and methods for carrying out component transaction of account payment // 2628326
FIELD: information technology.SUBSTANCE: system includes a customer interface for communication between the processor and the customer, configured to receive information about the composite payment transaction from the customer and to transfer the composite transaction identifier uniquely associated with the information oncomposite payment transaction, to the customer, an interface of electronic trading terminal for communication between the processor and the electronic trading terminal, configured to receive the composite transaction identifier and the confirmation of payment reception from the customer from the electronic trading terminal, an interface of money recipient for communication between the processor and two or more money recipients, configured to communicate with two or more money recipients to confirm that the information on composite payment transaction is accurate, and to transfer the money to two or more money recipients, and a processor associated with the customer interface, electronic trading terminal interface and money recipient interface.EFFECT: ensured execution of electronic payment transaction.26 cl, 5 dwg

System on-a-chip to implement safe bootstrap loading, using its device of image formation and method of its use // 2628325
FIELD: information technology.SUBSTANCE: system on-a-chip to perform the safe bootstrap, using the encrypted data, containing: the first memory for storing the encryption keys plurality, that are stored; the second memory; the third memory for storing the encryption key value, that is stored; the first memory controller to control the access to the first memory; the second memory controller to control the access to the second memory; the bus; the CPU for the encrypted data decryption, that is stored in the external nonvolatile memory, using the encryption key, corresponding to the encryption key setting from the plurality of encryption keys in order to store the decrypted data in the second memory and perform the bootstrap, using the data, stored in the second memory; and the switching unit for selective connecting one of the first memory controller and the second memory controller to the bus in accordance with the CPU operating state.EFFECT: RAM initial loading process improvement.12 cl, 31 dwg

Determination method of the active input elements of the input link and the input link // 2628320
FIELD: information technology.SUBSTANCE: method contains provision of the input elements, that are connected according to the matrix link, provision in the matrix link of at least two drive lines each connected to the corresponding drive circuit, provision in the matrix link of at least two reading lines, that can be used to detect the active input elements, provision in the matrix link of the serial connections, each of which contains one of the input elements and the resistor. Each serial connection is connected to the corresponding one of the drive lines and to the corresponding one of the reading lines, provision of the pull-up resistors, that connect the reading lines to the first potential, and using of the control device for the drive circuits.EFFECT: avoidance of the false keystrokes.15 cl, 37 dwg

Liquid crystal display module and mobile device // 2628318
FIELD: information technology.SUBSTANCE: liquid crystal display module for a mobile device is proposed, comprising: a display functional component disposed in the enclosing space of the mobile device frame and adjacent to the inner frame border; and a protective glass made in the form of a front glass placed directly on the functional component of the display and having such a size that it is placed, at least in part, on the upper surface of the frame. The protective glass covers most of the top surface of the mobile device.EFFECT: simplified design of the mobile device.9 cl, 7 dwg
Intelligent hybrid modular building management system (smart house) "insyte" // 2628289
FIELD: radio engineering, communication.SUBSTANCE: intelligent hybrid modular building management system (smart house) contains a controller which is configured to work in a wired network RS-485 using the Modbus protocol and in a wireless network using the ZigBee protocol. Actuating wired modules are connected to the controller using wired network RS-485, intended for connection to the controller of sensors and actuating devices. Actuating wireless modules are connected to the controller wireless networks using ZigBee protocol, intended for connection to the controller of sensors and actuating devices.EFFECT: combining wired and wireless protocols in one system.1 cl

Device for information processing, method of controlling information processing device and data media // 2628269
FIELD: radio engineering, communication.SUBSTANCE: device comprises: an installation unit configured to set a wireless communication parameter to the first value, in which the information processing device searches for an access point, and the information processing device is connected to this access point, or to the second value, in which the information processing device does not search for an access point; a short-range communication unit; a changing unit configured to change the said wireless communication parameter from the second value to the first value, in case, when the short-range communication unit obtains connection information including the SSID access points, and the wireless communication parameter is set to the second value; the wireless communication unit configured to be connected to the access point indicated by the SSID, and a returning unit configured to return the said wireless communication parameter from the first value to the second value.EFFECT: increasing the data transmission speed.19 cl, 9 dwg

ethod and system of preparing text-containing images to optical recognition of symbols // 2628266
FIELD: physics.SUBSTANCE: image processing subsystem is proposed within a device, the device or system designed for optical text recognition. The subsystem receives an image containing text with the curved strings and enters the resulting text-containing image into the image processing subsystem, which in turn generates a corresponding corrected image with rectified text strings with a rectangular arrangement. Herewith such image processing subsystem includes a separate hardware layer or a hardware layer used in conjunction with a device, an apparatus, or a system, including one or more processors, one or more memory modules. The subsystem also contains instructions in the machine code stored in one or more physical storage devices that, when executed by one or more of one or more processors, control the operation of the image processing subsystem in part of the following operations: obtaining the input text containing the text; defining a sub-image of the page on the text containing image.EFFECT: expanding the arsenal of technical means of optical text recognizing systems.22 cl, 77 dwg

ethod of setting bit synchronization on information signals based on results of decoding // 2628263
FIELD: radio engineering, communication.SUBSTANCE: invention can be used in data transmission systems using phase-shifted signals, without the introduction of redundancy, to maintain bit synchronization for phase-shift keying (PSK) or quadrature-amplitude modulation (QAM) which code constructions use block noise-immune codes. The essence of the method consists in demodulating the received signal, decoding the codewords with error correction and verifying the fact of decoding based on the results of calculating the syndrome. Under the condition of zero syndrome or syndrome corresponding to a given number of errors, the received information block is coded with an noise-immune code, modulated, the correlation properties of the received signal are checked, and the intercorrelation function (ICF) with the signal received from the communication channel is calculated under the specified ACF requirements.EFFECT: increase of noise-immunity of information transfer.1 dwg
 
2551022.
Up!