Abstract:
A system (10) and method for executing an interactive software application such as a game. The invention enables a game developed on one platform to be ported to another incompatible platform without recompilation or modification while the performance of the game is not reduced on porting. The system has a game application (11) that defines model objects; an engine (13) that generates and stores model objects (14); and a hardware module (15) that retrieves the model objects and executes corresponding hardware methods. The engine does not make a sequence of procedure calls to the hardware module. An abstraction layer (17) provides synchronous communication between the hardware module and the game application and further provides synchronous communication between the engine and the hardware module.
Abstract:
The method, apparatus and material relate to the positioning of a cold seal adhesive on wrapping material for articles and rolls of articles. The material comprises a paper, plastics or foil substrate (12) defining two surfaces, each of which have two edge regions, one region (34A,34B) of each surface having the adhesive applied thereto so as to form a lap seal upon roll wrapping an article. The method of wrapping and wrapping apparatus involve the presentation of modified wrapping material and the subsequent overlying of one adhesive carrying edge section (34A) over the other (34B) to form a continuous contact seal along a longitudinal peripheral axis of the articles or rolls thus wrapped.
Abstract:
A method and apparatus for charging a nickel-cadmium battery by a large current larger than 2C rate. The temperature and voltage of the battery are monitored. At the time when the temperature-rise rate of the battery is at least twice the increase of the one measured just before, or when the time of such a phenomenon being observed coincides with the time when the sensed voltage-rise rate of the battery lowers firstly after it increases continuously for a predetermined term, the operation of charging the battery is interrupted.
Abstract:
A fan assembly for generating an air flow within a room includes an air inlet section having an air inlet, an impeller, and a motor for rotating the impeller about an impeller axis to draw an air flow through the air inlet, and an annular nozzle having an inner wall,an outer wall extending about the inner wall, an air inlet for receiving the air flow, an air outlet for emitting the air flow, and an interior passage located between the inner wall and the outer wall for conveying the air flow to the air outlet, the inner wall defining a bore through which air from outside the nozzle is drawn by the air flow emitted from the air outlet. A support assembly supports the air inlet section and the nozzle on a ceiling of the room.
Abstract:
A computer implemented anti-tamper system employing runtime profiling of software in order to decide where to inject integrity checks into the software, to enable verification of whether or not the software has been tampered with. Runtime profiling and analysis is used to record information about the application, in order to establish the locations and targets of runtime integrity checks in order to optimise protection security, while minimising the performance penalty and the need for hand configuration.
Abstract:
An implementation tool for generating an implementation of a first data structure, wherein the first data structure comprises a plurality of linked structural components, and wherein the first data structure represents meaningful components of a given system and a parent set of interrelationships between those meaningful components, the tool comprising: first-data-structure input means, operable to receive a said first data structure, or a description thereof; and processing means operable to generate an implementation of the received first data structure, the implementation comprising: a second data structure, or a description thereof, corresponding to said first data structure, wherein said second data structure is defined by a subset of the parent set of interrelationships; and implementation rules which allow the parent set of interrelationships to be enforced during a subsequent processing operation which utilises said implementation.
Abstract:
A personal electronic device comprising: a first microprocessor which controls the personal electronic device; secure memory which stores (i) first secure data which is required for a security-related function of the personal electronic device to be carried out, and (ii) second secure data which is required for an authentication procedure; a second microprocessor which is communication with the first microprocessor and the secure memory and which controls access to the data stored in the secure memory; wherein the personal electronic device is not operable to carry out the security- related function which requires the first secure data until an authentication procedure which requires the second secure data has been successfully completed.
Abstract:
A personal electronic device comprising: a first microprocessor which controls the personal electronic device; secure memory which stores (i) first secure data which is required for a security-related function of the personal electronic device to be carried out, and (ii) second secure data which is required for an authentication procedure; a second microprocessor which is communication with the first microprocessor and the secure memory and which controls access to the data stored in the secure memory; wherein the personal electronic device is not operable to carry out the security- related function which requires the first secure data until an authentication procedure which requires the second secure data has been successfully completed.
Abstract:
A method of source code instrumentation for computer program performance profiling includes generating (14) and inserting (19) instrumentation code around a call site of a child function in a parent function. The instrumentation code may use a reference to an unique instrumentation record (13), such as a timing record. The instrumentation code may be optimised (15) to use the exit time of a preceding call site in the parent function as the entry time of the call site. It may be inserted depending on the level in the call hierarchy of the child function and its execution at run time may depend on the state of an enable flag, which can be set via a viewing interface. Two versions of the child function may be generated (18), one being instrumented and other being non- instrumented and which one is run depends on the enable flag.
Abstract:
A method for detecting an imperfection in a blister package having at least one radiation-transmissible layer (32), optionally moving, the blister package having a flat side and a pocket side, the method comprising the steps of directing radiation (18, 18’) at the flat side and/or the pocket side of the blister package and detecting any radiation (22) emitted from at least one edge of the blister package.