☆☆☆☆☆☆☆☆☆☆ THE 5 IMPORTANT THINGS FOR ENTIRE WORLD ☆☆☆☆☆☆☆☆☆☆
The 5 Important Things to Do to Secure Data for Entire World
WiFi[+]Secured: Invention # 1: New Way to protect WiFi Network from Hackers (short name Wifi[+]Secured); the WiFi[+]Secure is the WiFi router or Wireless Hotspot or Cloud OS Hostspot with Press-and-Scan to have access without showing the WiFi name on user devices to prevent unauthorized into WiFi routers...
Cloud OS: Invention # 3: Cloud OS -- Operating System; the new Secured Cloud Operating System for Server Machine hosting at Data Center. The new World Computing Infrastructure Modern which running in Cloud OS Server Machine at Datacenter and provides users with Application Service Container or Virtual OS (vOS) which is dynamically protected by Cloud OS via Neighbor-to-Neighbors Routing Technology...
The G-Drive: Invention #5: Greatest Performance Hard Drive; the G-Drive with Secured Negotiation Communication Protocol to prevent unauthorized access to read the hard drive; and the Cloud OS which resides in the hard drive and runs in the server machine with Machine Intelligent that can prevent unauthorized access into the Cloud OS server machines at the Datacenter...
Secured World Wide Interweb: Invention # 3: Cloud OS which runs in the server machines with self-routing mechanism which applies the G-Routing Algorithm with Neighbor-to-Neighbors Routing Technology; and Invention # 9: G-Routing Algorithm -- which are intended to replace the current Internet with Interweb and Datacenter with Cloud OS Star Tree Topology Center...
Matrix Base Keyboard: The Secured Keyboard which can prevent Keystroke logger wire/wireless sending out any keys while typing (In-progress invention)...
INVENTION TITLE: "The Cloud OS - Operating System"
was submitted on October 02 2021 to the World Intellectual Property Organization WIPO with the International Patent #: PCT/IB2021/000683. The Cloud OS Company will be open in Southern California. The Company is currently waiting to open while I am waiting for the final certification process from both www.USPTO.gov & www.WIPO.int organization offices for the Cloud OS Company Trademark #: 99425011, Patents, Awards and the Money/Resources before announcing the official physical location.
The Cloud OS - Operating System is designed with State-of-the-Art with nice Look & Feel and data secured in mind to prevent hacking, and secure data with the new 3D e-Web (Electronic Spider Web) with the new Neighbor-to-Neighbors Routing/Networking technology,
and intended to replace all the existing Computing Operating Systems like Windows Operating System, Mac Operating System, Linux Operating System, etc... with more user friendly. Note that the current Network or Networking which was referred to the links or connections of a net with nodes represented for computers or servers of the network in form of volleyball net without center node; the Cloud OS uses Neighbor-to-Neighbors Routing technology in Star-Tree Topology (1-to-5 in star form with center of many StarWebs/eWebs with multi-layers) in layout of spider web and named as eWeb and functioning as Webbing, Webwork, Weblinking, Weblinker etc... for entire Cloud OS Data Center...
The Cloud OS will run in Cloud OS server machines which composed of million and million of machines and will divide into topology groups like Data Center currently, but with no keyboards, no mouses and no monitors to prevent hacking right at the network topology sites. The data at topology sites will beam back and forth to Starlink satellites to for internet (Interweb) communication from one topology site to another site and from one country to another.
The Cloud OS will have the Cloud OS Engate Service Container which will be always available where ever has signal coverage for the user to engate into the Cloud OS at first stage of login or first authentication service. The Cloud OS Engate Service Container, which will be the same everywhere, will be the container of the first service that lead the user to the Cloud OS world before login. Note that the service container will contain the service, and the service can be dynamically and randomly changed at anytime... User devices will download Application Service Container after authentication process to allow the user login to their Cloud OS account. The Application Service Container will host user's apps and data with high secured protection of the 4K Number Encryptor technology which has been used in ZFilePackager app that provides free to use to backup user data while waiting for the Cloud OS.
The Application Service Container is part of the Cloud OS and running on user's devices and the data will be synced up to the user's account and store in user's Cloud OS account every few seconds or whenever possible. When the user's devices turning off, all data will be in their Cloud OS account, and the apps with current states of user's workspace stay the same for the next login.
After the user authenticated with Cloud OS account, the user authentication (password & magic number) will not be stored on user devices. The user password & magic number will convert into the 4K Number Encryptor form-factors in several sequences during authentication to prevent hacking thru the air or wireless access. The users will have no worry of losing their data when the lost their devices like currently.
The Cloud OS will support 64-byte instead of currently 64-bit, and support new Alpha Number 0α12345..ABCDEF..ZÄabcdef which counting from 0-9A-ZÄa..zä (base-64 with Latin Characters) instead of currently 0-9A-F (base-16) as the Hexadecimal representation. This new Cloud OS Operating System will bring our world of computing to the new World of Computing Infrastructure modern with the new World eWeb (the Internet [spider] Web) applying the Neighbor-to-Neighbors routing technology for Self-Manage and Self-Grown with great dynamic secured data transfer protocols
to protect from hacking as mentioned in Invention #9: G-ROUTING ALGORITHM METHODOLOGY for the best network routing technology. The Cloud OS will be the great promise Operating System which provides great data secure, with no or less of IT services and with no or less or maintenance and will work great with StarLink satellites network to provide people around the world with a secured and unified The World of Computing Infrastructure Modern. The Cloud OS works great with Starlink Satellite Network for the perfect world of Internet (Interweb) and the future of World Computing with the great invention #5: Greatest Performance Hard Drive (G-Drive) which is ready for Quantum Data Storage...
The Cloud OS Operating System is one of my total 16 inventions. Invention #5: Greatest Performance Hard Drive (G-Drive) will provide the greatest performance hard drive ever and ready for the Quantum Hard Drive with Quantum Recording Technology and ready for Quantum Data Storage which was mentioned on my Social media and Linked-in media networks. The Cloud OS will use the G-Drive as the main storage with Rotation Division Multiple Access (RDMA) technology
for faster data access with support of data secured protocols sequences to protect user data around the world. Keep in mind that only OS in cloud can protect data in cloud, so Cloud OS is the best Operating System ever and will be the future operating system for all kinds of smart devices, phones, tablets, etc... Below are the features in short description of the Cloud OS Operating System.
Cloud OS will use new Programming Language UCOOP (Unified Common Object Oriented Programming) Language. The UCOOP programming language will derided from Java and only run within Cloud OS Operating System with new Cell Grid Layout for UI design, supports auto Retry within the scope of Try/Catch blocks. The UCOOP programming language will support new Sort algorithm with merging range option. Improve ComBobox or DropdownList components to prevent changing value when rolling mouse after select the value/item from the list. The new language also protects from software inheritance and much more... The Cloud OS will apply the new Software Model
which was invented around in October 2022 and is intended to replace the current model of 3 modeling circles (Model-View-Control).
Cloud OS will support compiler so everyone can program and build their own application within their own account before build their applications with Public Application Build-Certificate to release and run in public environment which provides the users with the statistic and information of the 3rd party applications.
Cloud OS will support 3D Search Engine, the Spiral Data Pipe length Model Search Engine applying the 4x4 bytes Match & Search Algorithm and extendable for Language Searching Algorithm which applying the 'Word x Word' Match & Search Algorithm.
Cloud OS will not allow to change the clock in any applications or within the workspace to prevent things going in revert directions; this feature can be used to prove the original owner of the file by timestamp of file creation and more...
Cloud OS will use Hand Writing Recognition more accurately for only one user per account and only one user Data Mining for Cloud OS Machine Learning for the Cloud OS Machine Intelligent (MI); and only one handwriting recognition for the account user, not like current computer with handwriting recognition that needs to recognize to handle many different kinds of hand-style users around the world for other applications which is too cumbersome to handle. This can be use for Cloud OS account login to recognize real owner authentication. Cloud OS will also support pen mouse (stylus or ëPen) which can be used to write the login passwords on the table without ink (invisible) to login...
(Unified Standard Code Language Information table) which supports all languages around the world with markup tags for Language Codes & Language Fonts, plus pre-translated common phrases codes and common symbols/icons codes.
With Cloud OS, when creating Cloud OS account, the users can have many different password formats options; like Clock Password (1 password for each hour of day depends on user's choice), Password & Magic Number or Login with Image 4K Number Encryptor... etc... and they are all go through 4K Number Generator for high secured authentication.
With Cloud OS, when login to Cloud OS account from the user's devices or a borrow device, user's data and apps will look the same. And when the user logout from the borrowed device, all the apps and data will go the the cloud and leave no residue in the borrowed device.
With Cloud OS, when the users can still have their data in cloud to view anywhere, has no sensitive data or password to worry if the users lost their computer or laptop like currently. With Cloud OS, the user device will be more simple without large storage devices and less hardware components than currently, the laptop just has the temporary memory RAM (Random Access Memory) chip, CPU (Central Processing Unit) with GPU (Graphic Processing Unit) and a wireless chip as the main components; the laptop can be foldable in dual book-view with virtual keyboard on the other half. However, to support off line working, the Cloud OS will ask the users to keep the working files locally into the supported local storage to work and later sync-up the data to their Cloud OS Accounts. Plus, the Cloud OS can use the existing mini PCs to load Virtual Cloud OS or Application Services Containers with the existing SSD support for off line data and allow the users to sync-up data later to Cloud OS...Note that the data files/folders structure for both local and in Cloud OS structure can be selected to sync automatically right after the data is saved, and the files can be selected to remove from the local data storage after the files are synced to the Cloud OS for Data Secured purposes when the user lost the devices...
Cloud OS will support Language Writer, Language Reader, Data Grid Analyzer, Data Grid Viewer and Presentation Designer in different Languages as the standard applications like Microsoft Word, Excel or Power Point in Windows.
Cloud OS will use standalone apps style instead of apps in browser. Cloud OS will support standard API for developers to develop their Website apps, and one Website app for each website instead of all or many websites can be opened within one browser instance which create so much confusing and out of control when the users have many websites links opening like currently with Google Chrome, Internet Explorer or Microsoft Edge. However, one Website app can link to another with a public hyperlink but the link will be opened by the Website app which the link belong to for security and 3rd party Look & Feel application protection. The Cloud OS will allow the users to be able to host their own web site within their own Cloud OS account and much more...
Cloud OS will allow the user to search the Apps Room to choose and enable the Apps to use; The users don't need to install apps like we do currently for many decades. All applications must be certified and built with Build-Certificate which contains statistic and information about API or Protocols the apps used to identify potential of hacking. With Cloud OS, the users can return 3rd party applications to have money back within returning time-window after they bought; this is one of the great features of the Cloud OS.
Cloud OS will standard API and Protocols for 3rd party user's devices in standard protocols; Users don't have to install drivers for their devices like we have done for many decades in Windows.
Cloud OS will provide at least 3 backup data locations randomly in 3 different network topologies to prevent data lost; The users don't need to have USB flash drive or hard drive to storage their data. However, the Cloud OS will provide a download the encrypted raw-data to the Cloud OS compatible storage devices and only Cloud OS can convert the data back when the users upload back to the user's Cloud OS account with the 4K Number Encryptor.
Cloud OS will support Unique Machine ID (machine address) start from 10 bytes and stepping up 2 higher bytes using Alpha Number instead of Hexadecimal Number (currently with only 6 bytes in hex) to prevent duplicated machine address.
Cloud OS will use Invention #9: G-ROUTING ALGORITHM METHODOLOGY as a routing algorithm for the Star-Tree networking topology in 3D World Electronic Web and intended to replace the current Internet Network Backbone which current has many hacking issues that allows the hackers hosting the copy-modify websites from one community to another community with the current routing method of which ever closest server goes first. Another critical issue is the duplicate machine address or IP address will provide the hackers share the same content of current session as the user's view. The Cloud OS machine will handle the data routing and use Neighbor-to-Neighbors routing technology and prevent server machine get kidnap or stolen. The Cloud OS machine has its own star network connections and no need to have the 3rd party routers like currently to prevent unwanted server machines connecting or disconnecting without network notification capability. Note that the Cloud OS Server machine would have 7 Ethernet ports with one Reserved Port and 6 Ethernet Ports for star-tree (1 to 5) Topology plus 2 Additional Ports for Hardware Linker which are hardwired to the Reserved Port and used to create hardware linker to other communities as a shortcut for networking or web-linking faster in routing optimization in the Datacenter. The Star-Tree topology can be configured in the Hexacell Network connections in the Left-and-Right Expandable Circle Network which provides to configure the network with desired limit boundary for great performance and great management in Razone and Rozone network layout; note that Razone is defined as Radius Zone, and Rozone is defined ad Rotational Zone in circle sector degree. The Hexacell Network connections can be used for group of users for a domain or company/organization that have many workers having the data sharing together which should be close together in group of Hexacell Network. The The Left-and-Right Expandable Circle Network server machine would have 2 Left-and-Right physical ports to connect left and right servers to form a complete circle when the circle network is completed, this would give the Webwork connecting in centric infrastructure. The Left-and-Right Expandable Circle Network would be used in combination with Star-Tree Network for Cloud OS eWeb (Interweb) for future of our World of Computing Infrastructure Modern. The Cloud OS WeWeb (Worldwide Electronic [spider] Web) will automatically notify when new Cloud OS network branch is connected or will automatically notify when a Cloud OS server machine is gone missing. The Cloud OS WeWeb will also automatically draw and count the Network eWeb nodes (server machines) around the world.
Cloud OS will support corporate accounts under an organization or a company with their own policy. The organization can set their own policy to allow employees the permission to share data to public via Shared-βox.
With Cloud OS, the users don't need to have IT services or bring their laptop/computer to repair shop any more like currently.
With Cloud OS, company or organization needs little or none of IT services. The Cloud OS will provide standard domain policy and can be configurable to apply for employees under a company or an organization. A company or an organization will have a Cloud OS account, and the employees will have Cloud OS accounts under the organization domain Cloud OS account.
Cloud OS will support entire world with same version with latest and greatest. This will provide the same Look & Feel and compatibility to all users and 3rd party applications.
With Cloud OS, the users will access directly to their Cloud OS account from anywhere around the world; and don't support Remote Desktop like currently which is not secured.
Cloud OS will support In-App Auto Translation like i18n Internationalization or i10n Localization currently with pre-translation, but Cloud OS will fully support In-App Auto Translation to translate words in UI applications when the users select or pre-select their Preferred Language in their Cloud OS Account. The Cloud OS with UCOOP Programming Language will provide the simple rule for app developers to enable the In-App Auto Translation. The rule would be Key-Word-Row and Language-Code-Column in the property file; The Translation-Property file with default English plus other languages on other columns. The Language Code columns that have words pre-translated will be used, and blank columns will be auto-translated. The Translation-Property file would have one optional column for all other languages without pre-translation; This column can be named 'OTHER' to support In-App Auto-Translation. If this column is omitted, the app only translates the languages that defined in the Translation-Property file. The USCLI Table:
Cloud OS will provide the user account with one and only one account loginwithout any other built-in or hidden accounts. The Cloud OS will provide the user login statistic of the previous logins with date time and during of usage include statistic of previous Shared-βox links... There are more and more great features and convenience that's endless to say when you are with Cloud OS...
Cloud OS will allow Corporate or Organization to allocate accounts for their employees with 2 Password sets and create a temporary password set for employee before assign the accounts to their employees. One for Initial Password set and one Unlock Password set for last take over when an employee left the company or organization or help to reset employee's passwords. These 2 Password sets will be used after the accounts have been suspended/lockout for taking over the accounts for security and/or reset passwords for recovery purposes. Note that all these activities will be logged as readonly and will be shown for login statistic when the user regain the login to the Cloud OS account. As a company or organization, a list of authorized personnels will be able to trigger to suspend an account; and with a minimum of 3 or defined number of people (minimum authorized security team) from that list can trigger to suspend an account depends on company policy. Beside the individual account take over as read-only, Cloud OS will support Subdomain or Service Accounts under an organization Account for Departments/Group Accounts which would have shared folders, shared apps, shared services for all members accounts in its own hierarchy branch; In case forgot password, the account can be retake with the Initial Passwords set with full permission to allow set/configure the services if needed (this will prevent from one person set pw and leave without notification); this account will be managed by the organization authorization personnel/officer. Cloud OS will transform user passwords to different encryption forms for no one else will know the user account passwords and there is no passwords recovery option for security purposes. However, Cloud OS will provide
account for other security purposes like raw-data download for backup for Cloud OS with 4K Password or zipping data with 4K Password within Cloud OS. The Cloud OS also provides this feature for individual as an optional security account recovery feature but the users have to keep these passwords by themselves. The individual will have options either record their 2 Password Sets and save in case need to reset passwords and/or send to their love ones a link to keep as secret Password Recovery Options. When enter into password or account recovery, the users will be asked to enter personal info plus these 2 Password Sets or enter their secret Password Recovery account of their love one... Fingerprints with order of 3 or more fingers can be another login option plus a magic number and/or favorite day/month/year write in your own format... With Cloud OS the users do not need to remember other passwords like Facebook, Twitter, Costco, Amazon, etc... All these service apps can link directly within user's account by Username... When creating these accounts, the service apps will ask for unique username and generate an account identification 4k number. The account ID 4k number will be stored on user's account and the service apps use to identify. The user need just the username to login (support multiple accounts), and the acount ID 4k number will be automatic load and identify to simplify user's input and account passwords to remember... We can keep the traditional login to these service accounts by entering both Username & Password as an option, but the users have to remember their password...
Cloud OS which could be run in any Cloud OS compatible user devices, will support voice and video communication with high secured data and message transferring via dynamic protocols (protocol containers + protocols); transferring the same data but the content of encrypted transferring data will be different each time of transmission. Part of this 4K Number Encryptor methodology has been used in ZFilePackager application. The voice and video communications can be used by mobile devices like phones or tablets contacting each other via phone number or Cloud OS Email Address. The mobile devices can be used with or without Cloud OS. Without Cloud OS, the devices will be in the analog mode when no Cloud OS eWeb is available in mountain or middle of the ocean. With mobile Cloud OS like I already mentioned above when the user login into Cloud OS account, the Application Service Container will host users apps and data. This will be the great promise for the future of the World Computing Infrastructure for both mobile devices and desktop platform devices with high secured data and communications...
Cloud OS will support children account under a parent account similar like the corporate accounts so the parent can have his or her parent control over their own children. However, the Cloud OS will provide the default children's Cloud OS rules for security and policy restriction purposes apply across the world...
Cloud OS will support Cloud OS Hostspot or Wireless Base Hostspot which would be replace the current WiFi or Wireless Access Points which would be used the same "Press-And-Scan" to get WiFi Access that was already mentioned in invention #1"New Way To Protect WiFi Network From Hackers" with short name "WiFi[+]Secured". The Wireless Base Hostspot can be used to connect all wireless printers, wireless storage devices securely, and the Wireless Base Hostspot provide 2-Factor Regain Authentication for home, office, company, organization etc... The data files that zipped with the 4K Password by the ZFilePackager app that I provided on the main page would be secured to transfer for backup or to upload to the Cloud OS account when Cloud OS is ready to use with support of ZFilePackager app running in Cloud OS. The Cloud OS Hostspot or Wireless Base Hostspot which was mentioned several years ago before I invented this invention and also mentioned in the invention #12, "Wall Security Camera System"; the system would have Camera Hostspot which would host all cameras and record to Camera Hostspot before sending to the Cloud OS Hostspot or Wireless Base Hostspot to deliver motion notification videos to the users' Internet account or to the users' Interweb Cloud OS account.
Cloud OS would use Cloud OS Hostspot or Wireless Base Hostspot as the authentication device, a well known/trusted home base device to allow the users to regain access as the "2-Factor Regain Authentication" to their Cloud OS account after they lost all mobile devices or forgot their password(s). Note that the 2-Factor Authentication currently we have used, Cloud OS still support 2-Factor Authentication apps. However, the 2-Factor Authentication app is running in Cloud OS account so the 2-Factor Regain Authentication on the Wireless Base Hostspot allow the users to regain access after lost all devices or forgot password(s). This will solve the existing problem we have currently when we have a service with 2-Factor Authentication required and lost devices, phones or forgot passwords... As mentioned several years ago right after I invented the "Cloud OS - Operating System" in year 2021, the users can reset their passwords when they go home without charges and charge for small amount when they reset the passwords where else for security purposes; plus the Security Date Question as mentioned before with favorite Date, Month and Year in their own format.
Cloud OS will support great feature for Transferring Data files to Family Members or Love Ones before retiring or setup in critical condition of lost ability to regain access...; the owner must setup the family members or love ones list, and time windows and notify/remind both sides for at least 3 times to remind before transferring data. the Transferring Data is still generating by other service apps or camera recording files; Data will be continue transfer within the Transferring Folder to the selected person every week until the data is stopped generating or maximum in one year. Data Files will be selected to Transfer and certain Files can be chosen to send to certain person, and Data Files in size would be calculated a head with the notification...
Cloud OS will support lot more and more good features and cannot able to list all here...
Lelf-and-Right Expandable Circle Network - Overview [Note that the Cloud OS Network will use (Star-Tree/1-to-5) or Hexacell Network in combination with this Circle Network for better managing, expanding with Self-Manage & Self-Control Networking or Webbing...]
Cloud OS: UCOOP Programming Supports RETRY within scope programming exception
Cloud OS: UCOOP Programming Supports Function Try Catch Finally
Cloud OS: Recommend Straight Latin Accentrophes (Marks) & Apostrophes
Existing World Computing Issues
Currently, the internet (network backbone is broken) is not secured and data transferring through the wire or wireless are hacked-able and viewable with a internet networking sniffer analyzer. User documents, personal data and passwords are stored in computer PC, laptop or tablets running in Windows OS, Mac OS or Linux OS. The keyboard and mouse are also the hacked components, every key stroke can be sent out to the hackers. What exactly computer hacking activities? Access and copy data files from a computer remotely, etc... Hacking into a computer remotely is meant accessing remotely with a hidden built-in account or with the user's password from the keyboard key strokes logger. Most of the smart devices have wireless devices other than the Internet WiFi devices could be built-in into the system and also built-in into the keyboards or mouses and even in side the monitors; and data can be sent out in deferent ways through hidden wireless devices...
Microsoft had never able to protect Personal Computer (PC) from hackers since I realized in Windows 98; and early Windows 3.1 with virus or malwares. Windows 10 is better than Windows 11 with better interfaces and more User Friendly than Windows 11. Windows 11 has more hidden hacked processes than Windows 10. I experienced the same crashed behaviors on Windows 11 and Windows 10 when the Windows restarting or booting up, without even installed any 3rd party apps yet, then Windows went to the hanging "Blue Screen" with spinning dot circle or the Windows went to "Reset this PC" screen. Even the old hacked codes/programs or malwares in Windows 95, 98, etc... still can able to run in Windows 11. Plus, Windows was designed with "dangerous" Windows Registry, the users can run 'RegEdit.exe' from command prompt to edit, and hackers can able to run Remote RegEdit Service which is provided by Microsoft Windows to change the behaviors of the PC to hack and/or crash the users' computer from remotely; Windows was designed with multiple "unknown/strange" users or accounts that the owner (regular users) could not able recognize to use or to login, those accounts we can see under 'C:\Users' and we can see more when set shown hidden files/folders; Windows was designed with easy hacking and much more issues that are related to hacking... And even with future newer version of Windows could not able to prevent hacking, old hacked programs can able to run, plus Windows was designed with "dangerous" Registry and allow Remote Registry Editing and lot of high potential opening for hacking services... All of these hacked issues is the big reason The Cloud OS came out with invention which was submitted in Oct 02 2021 (Please visit www.TheCloudOSCenter.com for details). And, we should stop Windows 11 instead and no longer need new version of Windows and keep As Is with providing additional Manual Services when the users request for supports instead of Auto Updates... while waiting for Cloud OS. I vowed and supported to keep Windows 10 which is better and more User Friendly than Windows 11, please read the news about Killing Windows-10 from the link Microsoft Sued for Killing Windows-10 and raise concerns to keep Windows 10 for now to work while waiting for Cloud OS. Linux OS is used for servers at Datacenter with the current Network Backbone (Internet) which was broken; hackers can hook up their servers anywhere to collect users' data; MacOS and other OS like Chromebook are built with command line which allows hackers to run their scripts to configure users' computers, and password plus user data are stored locally in users' devices where hacker can login with the built-in accounts; what if the users lost their devices, they will lost all data; plus emails are stored at somewhere else in the servers where hackers can get in but not the regular users. The Cloud OS will prevent all these problems; with Cloud OS, user data will be stored at Cloud OS Datacenter with Neighbor-to-Neighbors Checking Methodology and Neighbor-to-Neighbors Routing Technology (Cloud OS server machine needs correct neighbor Cloud OS machine to communicate and serve data for users around the world when the users login into their Cloud OS account from anywhere), the Cloud OS can prevent from hacking and hijacking Cloud OS server machines; emails are stored right on users data space of their Cloud OS account where they can control and manage with absolute One User Per Account, etc... There are lot to say about the Cloud OS which have been described in the invention document plus the details above in this page plus the Cloud OS Guideline which was written over 3 years ago since right after submitting of the Cloud OS invention in year 2021. The Cloud OS was invented to prevent hacking that Microsoft Windows could not able to, and lot more great things about the Cloud OS for the Future or the Next World of Computing Infrastructure Modern to protect data around the world... I have created HackedProcessKiller app (downloadable from www.TheCloudOSCenter.com with details About the HackedProcessKiller app) to prevent hacking and kill the identified or potential hacked processes with this app (check Help menu for revisions and instructions); it is free to use for Windows. Plus, ZFilePackager app (downloadable from www.TheCloudOSCenter.com with details About the ZFilePackager app) is also free to use (check Help menu for revisions and instructions) to Zip and backup data files with 4k Password and save while waiting for Cloud OS is ready to use...
Windows or Linux files system are accessible within the computer or laptop and the files system can be replaced easily by the hackers or by the super admin users remotely. Hacked code that was created for decades are still able to run in later Windows 10 or later version without a way to notify the users to check and remove. Remember, Hack means Spy (Hackoirob: Hack with Output Input then rob...). Current computer or laptop PC comes with lot of game apps, lot of un-necessary apps, and more likely hacked apps preinstall on the new computer...Cloud OS will provide the users with initial common standard apps (no game apps, no 3rd party apps), the users will need to goto Apps Room and search for 3rd party apps that they want and enable to use.
Windows or Linux super admin accounts are built-in and can be easily being used to access user's devices remotely. There are many hidden built-in accounts under "C:\Windows\users" if the Windows users enable or unhide the setting "Hide protected operating system files" under "Folder Options"
All currently computers or phones: Windows, MacOS(MacBook, MacAir, MacPC), ChromeOS(Chrome Book) have Documents, personal data and password are stored locally on user's devices PC, laptop or phone which will be lost if the users lost their devices.
Documents, personal data and password on user's devices can be retrieved by 3rd party applications right on your computer, laptop or phones.
What happens when the users bring their computer PC, laptop or tablet to a repair store for repair reset password, and how their account get reset? Only super admin can reset user's account, then documents, personal data and password can be leaked...
There are too many versions of Windows, MacOS or Linux OS to be updated, and the users have to deal with the different version of Windows or Linux and also the compatibility of the applications. Like documents that were generated with Microsoft Word, Excel or Power Point applications in different versions that may cause the user's data to be mismatched.
Even user's devices are up-to-date with latest version but there is not way to notify the users to remove the existing spyware.
The users have to deal with drivers or install and reinstall Operating System and/or applications for Windows or Linux OS -- MacOS(MacBook, MacAir, MacPC): are built based on Unix/Linux, Android-liked; ChromeOS(ChromeBook): are also built based on Unix/Linux, Android-liked; which is too much hassle!
There too much of cache memory and cookies running on the user's devices which can be hacked cached code or spyware. Most of the cookies or hacked codes are came from Internet Browser.
There are many unwanted and un-necessary Windows or Linux services or daemons running in the background which can be hacked programs that the users can not be aware of.
Currently computers support remote access, and one computer can be accessed remotely with the same account that can access more than one location or more than one remote access person.
Too much of IT services are required for current networking for a company or an organization.
The current computers support VPN, VNC or Remote Desktop which is not secured and open to many unwanted or unknown login accounts at the same times within the same computer without knowledge of the user that current using that computer.
The existing network or network backbone created with hacked holes with too much routers at Data Center (Unix/Linux servers connect to routers and provide keyboards and mouses at Data Center which provide hacking home for hackers, etc..) for the hackers to clone websites from a server then host at their interested locations. One server can host more than 100 websites without network notification capability of current network backbone of too many routers that are lossy from the servers or computers.
The existing Windows or Linux operating systems support 3rd party compilers, and the developers code can be compiled with the 3rd party add-on spyware code.
There are lot more of current problems and issues that could not list all of the
... Hacking to other computers to steal is the biggest problem with the current existing world computing infrastructure.
Existing Windows computer/laptopcrashes cause too much hassle (data lost, apps crashed, need to reset or reinstall...) for the users...With Cloud OS, crashes happen only on user's device, but the users can reboot the device and re-login to Cloud OS account without issue and data/apps look the same (data and apps are in cloud and protected by the Cloud OS). Cloud OS was invented with Self-Manage and Self-Control. The users do not need to bring the devices to repair shop to recover their device and data...
Existing MacOS(MackBook, MacAir, MacPC) are also hackable. Data and Password are stored on user's devices. When the device is crashed or reset, all data are deleted. The Appple icloud contains users's photos, videos files, documents, data files which can be accessed by hackers without users' knowledge, and data files can be deleted by hackers. With Cloud OS, each user Cloud OS account has its own account authentication and controller processes which are always running to protect and notify the users when any intruders' logins...
All Windows, MacOS, ChromeOS, and Linux computer or laptop contain user's data and apps, and the users cannot borrow a device to use with the same their own data and apps if the users lost their device (computer or laptop). With Cloud OS, the users can borrow a device to login to their Cloud OS account and have the same apps, the same data, and the same settings as their login previously if they lost their device
Existing MacOS (MacBook, MacAir, MacPC) when copying files and bring to Windows computer, there are extra files come with each file which can be seen obviously which provides hacking and crashing the files in Windows environment. The Cloud OS will define well clearly files and folders structure; and the users do not need to worry file transfer from one machine OS to another.
All Windows, MacOS, ChromeOS, and Linux computer or laptop are hassle for the users to transfer data documents from one type of OS (Operating System) to another or email to friends for coworks with different type of computer. Apps and data files are not compatible, and this is the most trouble for the users around the world. The Cloud OS will provide standard and common (free to use as part of the Cloud OS) Language Reader, Language Writer, Data Grid Analyzer, Email app, etc... (to replace Microsoft Word, Excel, etc...). Cloud OS will be use Starlink network to provide the entire world with the latest and greatest Cloud OS for every user around the world. The Cloud OS will provide the data converter gate for users to upload their existing data, documents to their Cloud OS account; data files transfer to different types of machine or computer will be no longer an issue. Cloud OS and Starlink Network provide the world the best and perfect World of Computing Infrastructure Modern!
About My Submitted Inventions
INVENTION TITLE: New Way to protect WiFi Network from Hackers -- (U.S. Only Patent #: 29/788,607 & ==> New U.S. Patent #: PCT/US24/17533 / International Patent #: РСТ/IВ2024/000110) In short title:
which provide the WiFi router a new way to protect WiFi network from hackers by "Press-and-Scan" to get access protocol. This new WiFi router will not broadcast WiFi SSID anymore, and it required the users have to be physically there to press-and-hold a button then scan a dot matrix code label which contains SSID & WiFi Pass-code to get access. The owners should have their owner wallet key in dot matrix label for the final Press-and-Scan step to have persistent access.
There are many different ways to hack into the current WiFi Network. And the current WiFi routers are difficult to setup for non-Network experience people. The current WiFi routers are default with visible WiFi name (SSID), and this will attract the hackers to hack into the WiFi router to have Network access. I introduce the new way to protect the WiFi Network [WiFi+Secured] completely from the hackers with the new WiFi router Press-and-Scan-to-Access. This new WiFi router Press and-Scan-to-Access will provide the owners and users an invisible WiFi SSID and the WiFi Password without the user inputs. The WiFi router should have a random WiFi SSID and a random Password label along with a wallet-card for factory-key and owner-key label that come with the WiFi router package. The WiFi SSID, WiFi Password, factory-key and owner-key should be in scan-able-code, barcode, QR-code or G-CODE labels.
The Authentication Owner key contains WiFi SSID, WiFi Password, and the owner-key. The Authentication User key contains only WiFi SSID and WiFi Password. The "Press-and Scan" button will allow the users to scan the G-CODE labels to have the Network access. To scan the WiFi SSID and the WiFi Password from the label, the users need to press and hold the "Press-and-Scan" button while scanning the label. However, for the owners accessing procedure, the device OS or WiFi application will ask to scan the owner-key to have persistent owners WiFi Network access. For appliances and small devices New Way to protect WiFi Network New Way to protect WiFi Network from Hackers from Hackers or security cameras using WiFi Network, the devices' providers can have an application to assign WiFi Network access to the devices and must follow the same WiFi+Secured protocol.
The whole idea of this new WiFi Network protection here is to have a button pressed while scanning the WiFi SSID and the Password to have access to prevent unwanted users from outside of the house or business accessing the WiFi Network. This idea also applies to the WiFi Extenders. The "Press-and-Scan" button should be close to the WiFi SSID and Password label. For more extensible Network like business, a separate wireless device has a "Press-and-Scan" button and an Authentication keys label provided to replace the routers with "Press-and-Scan" button and the labels that are hidden from the users. The device OS or WiFi application should only show the desired name but not the WiFi SSID even this is a random SSID. Click this link WiFi[+]Secured to check out the invention specification (Full invention document is not shown here for business security purposes)...
The dot matrix label can be G-CODE label; please visit
WiFi[+]Secured - Sample Drawing in Invention in G-CODE Profile Icon
WiFi[+]Secured - Wireless Router Overview in Specification
Conclusion: With this new idea, the Family-Client-Network and Business-Client-Network are worry-free from the hackers gaining access into their WiFi Networks. WiFi+Secured for Family-Client-Network are hidden from the neighbors and unwanted users. WiFi+Secured for Business-Client-Network are more secured and only allow access to the customers when they are in the business like Starbucks, Coffee stores, Restaurants, and small customer service businesses. This new WiFi+Secured Network protection will be even more secured for large business or corporates if they are sharing offices in the same building. A standard trademark below is for new routers with this new secured protocol to help customers and users identify the new WiFi+Secured protocol should have the Trademark and WiFi-Access-Label like below. The trademark and the WiFi-Access-Label should be printed right below the “Press-and-Scan” button. The WiFi security option should always be set to the highest security option “WPA2” or higher. Notice: The QR code below is just a sample code label, and can could be replaced by other code labels like Barcode or G-CODE labels.
THE G-CODE - Sample Drawing in Invention in G-CODE Profile Icon
The G-CODE Samples Overview
Conclusion: This G-CODE with State Of The Art design and dynamic grown in sizes, G-CODE is a Great CODE and designed to last ever. The G-CODE is designed to replace the existing dot-code or data-matrix labels like Barcode, Code-128, QR-CODE or any other Data-Matrix Code labels.
NOTICE: Deal to hacking issues, G-CODE was delayed of releasing and still waiting for International WIPO Office Certification. Click this link THE G-CODE to check out the invention specification (Full invention document is not shown here for business security purposes)... Please visit my website for more info: www.TheGCODECreator.com; please visit
The Cloud OS - Sample Drawing in Invention in G-CODE Profile Icon
The Cloud OS USCLI Table (replace ASCII Table) Overview
The UIX Software Model for Cloud OS Overview
Conclusion: The Cloud OS – Operating System will provide the users with nice Look-and-Feel and great user friendly interfaces. The client devices are much simpler without hard drive or storage devices, and provide the users with more data secured, low cost and low maintenance. This new design of Cloud OS – Operating System with State Of The Art design and high secured data protection, and much more reliable with great secured communications for VoIP, Video Conference, Data, Text, and Messaging services will be a promise future Operating System to replace the existing Linux, Windows, macOS and other existing Operating Systems. Entire Worldwide networks will be more secured, more protected, and more challenge for the future of our younger generations for Software Development and any other inventions with the Copyright protection supported. Please visit the main webpage
The Cloud OS Company -- Trademark Serial #:99425011 Cloud OS -- Trademark Serial #:99233424;
The Client Virtual vOS -- Trademark Serial #:99233481;
The UIX Software Model -- Trademark Serial #:99486195 Wireless Base Hostspot -- Trademark Serial #:99509703 Neighbor-to-Neighbors Routing Technology -- Trademark Serial #:99480439
The LPS Local Positioning System - Sample Drawing in Invention in G-CODE Profile Icon
Conclusion: The LPS – Local Positioning System will work great in the buildings, even in the tunnels and would be more accurate than the current GPS system. The GPS satellites are too far from the devices on earth compare to the LPS system, so the accuracy of the LPS will be much higher than the GPS system with higher frequency and faster data or information transmission compare to the GPS. The LPS can easily collaborate and easy to use and can be applied for many indoor applications such as Robot Carrier, Robot Cleaner, and outdoor applications such as Airport Traffic Control, Patrol or Security Guard Circle, etc... The LPS will be used in conjunction with the GPS to improve global and local positioning systems. This combination will be a big improvement for the world of tracking and positioning applications for both indoor and outdoor devices. This would be great improvement for Airport Traffic Control system in combination with Radar and GPS systems. Far more than that the LPS – Local Positioning System will enable the world of technology to create a Network of Flying Objects (NFO) or Network of Moving Objects (NMO). This would be a great help for military and security to use Drones in Military Patrol Circle and Security Guard Circle.
Reserved Applications: ['Phams Mobile Battle Field LPS Target Locator or Mobile LPS Target Locator' :>>> Application uses to locate a target in the battle field with the mobile LPS - Local Positioning System vehicles with DRONE, Unmanned Flyer or Remouflyer to search and pin point the target...]; etc...
The LPS - Local Positioning System -- Trademark Serial #:99233018 -- Trademark Image would be: LPS Locator -- Trademark Serial #:99480326;
THE G-DRIVE - Sample Drawing in Invention in G-CODE Profile Icon
The Future Quantum Data Storage Technology Overview
Conclusion: The G-Drive – Greatest Performance Hard Drive is designed with State-of-the-Art Geometry of 360° degree Disk Layout in combination of LED Radius at 0° degree detection will be a big promise for the future storage disk hard drive. The Cloud-OS was invented with the RDMA technology to allow each user has a chance to access their data on every rotation of the hard drive disk. This patent will be a great improvement for Data Center with Cloud-OS supports. The G-Drive will provide the fastest data recording for video systems and great for flying object recorders, like aircrafts recording while flying at low altitude. The G-Drive is a perfect hard drive for the Cloud-OS computer systems. With this perfect computer system, the world will have great Data Center with fast data storage and great Cloud-OS network; this will bring the world to the next level of computing infrastructure. This is a big promise for the future of our younger generations. Our younger generations will use these as the great tools to invent beyond what we have today.
The G-Drive -- Registered Trademark as 'G2-DRIVE' with Trademark Serial #:99228136 -- Trademark Image would be:
Conclusion: The Cell ëMap Live Updates System is invented with State-of-the-Art and providing secured broadcasting cell e-maps for navigation systems. Broadcasting cell emaps will prevent hacking or blocking from unwanted interrupters; and every smart device can able to receive cell e-maps on-the-go more privately without knowing from the others. The important feature here is broadcasting cell e-maps; so the smart devices or smart cars do not need to have phone or internet services to receive the cell e-maps. In addition to this, local organizations can able to update their own local maps for their points of interest and live traffic notifications by their own and in their own languages. The local organizations can have the rights to support international language like English broadcasting along with the local language using Language Tag to support international travelers. This invention will prevent the navigation hacking issue on cars or smart devices use for navigating while traveling; and will support much easier navigating algorithms which works for one cell would work on the other cells. This system is a promise mapping and navigating system for our future and our younger generations’ futures for our smart world with the future supporting of LPS Navigation System. The LPS Navigation System will use LPS towers along the roads, along the freeway, across the neighbors, city-to-city to provide more accurate locations with this Cell ëMap Live Updates System. More than just that; this new globe mapping layout of 10° and 1° LAT cell e-maps will help our astronauts, space vehicles, space stations, and future programs for Space Port, Space Links linking with our home, the earth more accurate than ever if we adding Cell eMap Towers along the Latitudes and Longitudes or Meridians. This new map layout with Cell eMap Towers can help to pin point lost of airplanes or greatly support Air Traffic Control, Air Defense, and UFV Unmanned Flying Vehicles better than ever.
The LPS Navigation System - The Magic Triangle Center Point
Conclusion: The LPS Navigation System is invented with State-Of-The-Art and supports LPS Automation Collaboration with great LPS Alert System to provide great technology for entire world for smart city, navigating vehicles, self-driving cars, flying cars, airplanes, unmanned aircraft, marshal drones, and any other smart devices navigating through the maps. The LPS Navigation System is designed to work with the Cell ëMap Live Updates System for large number of LPS towers around the cities, around the country, and around the world; the Cell eMap Live Updates System invention is also mentioned this invention and is intended to use for locating positions on the Cell eMaps to provide accurate mapping and navigating around the world with great layout of Cell eMap and LPS towers. The LPS towers can be powered by solar; they are small and convenient to install anywhere on any surfaces. This could be great for tall buildings and high mountains to provide obstacle objects to avoid for airplanes, flying cars, unmanned aircrafts and any other flying objects. The LPS Navigation System and the Cell ëMap Live Updates System, together will be a great promise mapping and navigating system for our future and our younger generations’ futures. This system will use LPS towers along the roads, along the freeway, across the neighbors, city-to-city, and country-to-countries to provide more accurate locations and secured maps than ever with the Cell ëMap Live Updates System and this great LPS Navigation System. Similar to Neighbor-to-Neighbors Routing Technology which has been mentioned in Invention #3: The Cloud OS - Operating System and Invention #9: G-ROUTING ALGORITHM, this invention is also using similarly Neighbor-to-Neighbors Linking Technology or Neighbor-to-Neighbors Propagating Technology, and recommended to have Atomic Clock Towers at the well-known and well-linked locations around the world for Atomic Clock Synchronization Accurately for entire world clocks including Satellites Clocks.
LPS Navigation System -- Trademark Serial #:99233054 -- Trademark Image would be:
Emergency Traffic Light Routing System - Sample View
Emergency Traffic Light Routing System - Protocols
Conclusion: The Emergency Traffic Lights Routing System is invented with State-Of-The-Art with the main purpose of find a shortest routing distance and set the routing traffic lights turn green ahead of rescue vehicle before the rescue vehicle moving. The system will be great help to rescue fires, rescue critical health condition people, and even great rescue in disaster emergency situations. The existing traffic lights controllers can be improved to support Emergency Traffic Lights Routing System by adding RF wireless device into the traffic light controller for each traffic corner. This invention would be helpful for rescuer team moving on the fastest route with pre-green traffic lights to rescue safer and faster. With existing traffic lights system, rescue vehicles may be stuck in the traffic at high traffic conditions when both sides of the roads are fully with cars and trucks. The Emergency Traffic Lights Routing System will help to clear the traffic before the rescue vehicles start moving; this is a great help to rescue in critical emergency situation or in disaster situation in bad traffic condition. The Emergency Traffic Lights Routing System will be great for smart city in the future, and the community will be safer with fast rescue responding.
Conclusion: The G-ROUTING ALGORITHM is fast and robust searching algorithm to find the best routes for the G-NETWORK layouts. The G-ROUTING ALGORITHM Methodology is invented with State-of-the-Art and invented to work with any other networks from simple networking nodes layouts to the most complicated machine networking nodes layouts. This algorithm and the G-NETWORK layouts are ready for the future of the 3-D networks or multi-layer networks, or cell structure networks like chemistry elements bonding networks. The G-ROUTING ALGORITHM Methodology is invented to support any networks in some geometry in G-NETWORK layouts. The G-NETWORK layouts are controllable and manageable and self-grown when new nodes are added into the network or nodes are removed from the network. The G-NETWORK layouts must be defined in form of Neighbor-to-Neighbors methodology for the properties of the neighbor nodes of each network node. The Neighbor-to-Neighbors methodology requires smaller database compare to other existing network routing database. When a node is gone missing or unavailable for any reasons, adding a new node into the G-NETWORK layouts is much simple compare to the existing networks and only requires Neighbor-to-Neighbors notification of network property changes. The G-ROUTING ALGORITHM is a promise for the future of networking and routing algorithm with the Neighbor-to-Neighbors networking technology. The Cloud OS – Operating System, Cell ëMap Live Updates System, and Emergency Traffic Lights Routing System inventions were intended to use the G-ROUTING ALGORITHM. The Neighbor-to-Neighbors networking technology provides the self-grown layout networks and can be more and more complexity and sophisticated in the manageable G-NETWORK form with multi-layers; only neighbor node knows its neighbor nodes. The G-NETWORK layout and G-ROUTING ALGORITHM provide the great secured and tied network than any other existing networks.
G-ROUTING ALGORITHM -- Trademark Serial #:99233174;
Summary: The PTP Theorem The Parallel Transforming Percentage (PTP) theorem can be applied widely to calculate lines, surfaces and volumes for any shapes and objects relatively to its original one. The PTP theorem is applied in this document to find surface center and object center and to solve the mystery of ellipse which currently has incorrect definition of two focuses. We now can have short definition of ellipse, ellipse is a circle which rotates an angle on its plane.
Beside the PTP theorem, I also proved other theorems to support the PTP theorem. One of these theorems solves the common misunderstanding of surface area verse circumference ratio. Circle is the magic shape which has infinite sides, and which ever shape that has ‘n’ sides equal (e-chord lines in its circle) always has larger area to circumference ratio compare to the shapes with the same number of ‘n’ sides not equal. This is also true for objects or 3D shapes with ‘n’ sides equal have largest volume than other objects with ‘n’ sides not equal; and sphere is the magic object with infinite sides, has largest volume to surface area ratio compare to other objects.
This PTP theorem is not just for geometry, this PTP theorem also triggers for many great ideas from weight to density percentage, color mixer in percentage to create giant airplane start from a testable dimension. Based on the greatest size of an object, the PTP theorem will be applied as the numbers within 0 and 1, and 1 is 100%. And the measurement is based on percentage without using actual number and unit for easier and better calculating and transforming of multi-directional transforming. The multi-directional transforming will be more common and useful in the future to help computer simulations faster and easier.
Reserved Applications: ['Phams Multi-Sigma Percentage Evaluation' :>>> Application uses to evaluate anything with percentage base that based on the Percentage Rule]; [Irregular Pyramid Percentage Calculation]; and [Irregular Cone with Circle or Ellipse Base Percentage Calculation]; etc...
NOTICE:
The 9 PTP theorems of the Parallel Transforming Percentage (PTP) theorem were translated into Vietnamese.
Please click image below to view "The 9 PTP Theorems in Vietnamese". The 9 PTP Theorems in Vietnamese
Suggestion for Mathematics Educational Program: I applied the PTP Theorem to prove the whole sets of Ellipse and found the current Ellipse definition was wrong with a wrong radius formula by angle which is critical and fundamentally wrong in mathematics which we should notify and focus on to correct text books. The below images links were collected from Wikipedia showing the current Ellipse with incorrect definition and a wrong Ellipse radius formula by angle. Recommendation for our younger Mathematicians to prove formulas during mathematics school years and thesis before obtain Mathematics Degree instead of accepting formulas to have a degree and ready to work for living...
Wrong Ellipse Definition (www.en.wikipedia.org + wiki + Ellipse)
Auto Following Motion Security Camera - First Invention Page
Conclusion: The Auto Following Motion Security Camera is invented with State of The Art design to solve the
existing security camera problems with high technology for more safety and security concerned to prevent dangerous situations in many cases. We need a security camera can automatically follow and
Auto Following Motion Security Camera record a motion target instead of manually login to an app and control the cameras manually while most of us are not physically stay at the property every time, everyday. With this invention of the Auto
Following Motion Security Camera, we will have better security camera system to protect our property, company, organization or point of interests. Protect property or point of interests is protect our society, protect our society is to make our society safer and more secured. So, this invention of new Auto Following Motion Security Camera system is great for our society.
Reserved Applications: ['Phams Auto Following Target System' :>>> Application uses in warhead missiles to follow target aircraft or unknown missile for Air Defense]; ['Phams Fast Approach Alert System' :>>> Application uses to detect fast approaching cars with narrow cams]; ['Phams Air-2-Air Fast Approach Alert System' :>>> Application uses to detect missile or unknown aircraft approaching in the air with clear environment with higher sensitivity]; etc... Trademark Serial #:99509789;
Wall Security Camera System - First Invention Pages
Conclusion: The Wall Security Camera System is invented with State of The Art in mind to provide our lives
more secured in many dangerous cases to instantly view and monitor outside views of the living rooms, bedrooms, offices, etc…, at anytime without having to open mobile camera app to check while the doors
and the windows are closed and covered. This Wall Security Camera System is also intended to resolve the existing security camera system issues when the users have the camera online account to view their motion events, but the video files could have been deleted by hackers, and the lagging issues of delaying
video notifications. This is great security camera that could be used in a closed office or a closed room to monitor for any motion object while working in office or sleeping in the bedroom. The Wall Security
Camera System is the great security camera system which provides directly and constantly monitoring outside views at anytime while seating or working inside the rooms.
Note that the camera viewer beside the main master cameras viewer, can support more than one input camera to save space but the camera views should be shown at all time. Trademark Serial #:99509789;
» [Click to View Document] is invented with State-of-the-Art and Smart design which is in strongest structure circle shape and circle building that has greatest area compare to other shapes, to help Air Traffic Control (ATC) view and control the entire airport better with no or less airplanes traffic while landing or takeoff. The Smart Airport in circle shape provides closest pickup and drop-off ramps with no or less traffic lights or stop signs with shortest walking distance for the travelers. The visitors and travelers can able to explore and view entire airport, and the travelers do not have to go through the security screening gates again after check-in and get into the lounge for boarding. The Smart Airport in circle shape is also invented with airplane rescuer running around in circle to catch airplanes stuck landing wheels and invented with the Airport Emergency paths with high custom security protection for both travelers and visitors for entire airport.
The Smart Airport is invented with landing and takeoff runways on both sides; each side provides both International and Domestic runways with two floors of Air Traffic Control which is intended to control International airplanes for the outer runways by the upper ATC floor and control Domestic airplanes for the inner runways by the lower ATC floor. The Smart Airport is invented with the new Multi- radar Layer Spherical shape system and the LPS -- Local positioning System for the airport and airport equipments plus recommended LPS devices for airplanes, which provides better detecting, tracking positions and calculating directions and angles of incoming airplanes better and more accurate which can be both passive and active modes to scan entire sky at once instead of rotating around to scan like the current radar system. The Smart Airport in circle shape which is not only provided better for Air Traffic Control but also provide travelers shortest walking distance from and to the airplanes for boarding or un- boarding through the gateways just within the circle radius distance of the Smart Airport building. With the circle shape, the OH Smart Airport is also perfectly designed to rescue airplanes stuck landing wheels with the Airplane Rescuer running in circle railroad until reaching the airplane landing speed to rescue the airplane safer. The Smart Airport in circle shape provides the best to handle Airport Emergency when both visitors and travelers have to be evacuated out of the building; the travelers who are already check-in will have emergency exit right at the boarding gates, and the visitors will have emergency exit paths to the ground level and exit only to two areas which are no need for security checking or screening again.
The OH SMART AIRPORT is the promise for future of the airport for air transportation with better viewing, exploring, and for quicker check-in faster checkout in shortest distance with the best rescuing airplane stuck landing wheels. The Smart Airport is also invented to protect illegal access with Airport Emergency Security Doors and better custom security check...
Check List:
Airport location is important; chose the airport with well known common wind directions for all seasons to layout the main runways direction and the wind direction runway is in 90 ̊ degree angles of the main runways. The runways are suggested to use the new Quadletter Compass to label the directions of the runways for better view and identify by the pilots.
The LPS – Local Positioning System is new and recommended to use in Smart Airport with at least 4 LPS poles at the 4 corner lines of the magic square of the railroad circle, plus at least a pair vertical LPS devices on the vertical line of the ATC tower. The LPS devices are recommended to equip in all airplanes for better positioning on the ground plus on the air for safety and security purposes. The LPS system would work great with the Spherical Multi-Dish Layers Radar system with both passive and active modes supported to scan short and long range better which provides great air traffic control for the ATC personnel.
OH Smart Airport is invented with 2 underground levels, 1 on ground level, and 3 airport building levels. Ground or Underground Level 2 is the airport access for all visitor parking, airport ground service, and airport custom security ATC personnel access with secured parking; Ground or Underground Level 1, with inner section reserve for the airport electrical power with pumping and air conditioning system, is the airport transportation level which provides cars, buses and taxi drop-off and pickup; Ground Level is the airport ground service for luggage, apron and the level for arrival travelers to access to the lower Ground Level 2 for security and checkout; Building Level 1 is used for departure and air ticket check-in and provide with quick drop-off and pickup ramps and 15 minutes parking spaces; Building Level 2 and 3 are used for visitors parking and travelers and visitors explore views.
Luggage check-in and out are important for the travelers, and this invention also provides Smart Cart Gear Belt Exchanger system. Make sure the cart path to arrival luggage area should one-way stocking and restocking carts, and cart paths from Building Level 1 to both lower Ground Level and upper Parking Levels 2 and 3.
Airport lounge waiting spaces and explore paths for travelers are important. Airport planers should define an estimate number of parking spaces and number of travelers to choose the radius of the airport building to fit the demand of the region. OH Smart Airport provides explore paths to upper levels with alternate views for both visitors and travelers; the travelers would have more space to hang around while waiting for boarding; plus the Coffee Spot or Sight Viewer which can only be accessed via visitors elevators of the ATC tower. The airport would have an option for shopping and eating areas; plus some semi-open rooms for privacy or for childcares.
The airport should provide Lost & Found services on the Arrival Ground Level 1, airport and travelers information center and car rental services.
The airport should provide enough flights schedule boards and power charger station around the lounge waiting areas and along the travelers explore paths.
When an emergency alert happens and the airport needs to evacuate people out of the airport, the airport security team should work with ATC personnel and airlines staffs on all gates and clear the areas for travelers and visitors to exit from the upper and lower levels inside the airport building. Airport police or top security would open the Emergency Doors on both sides of the building on the apron ground and the security team work with airlines staffs to secure the visitors and their travelers.
OH Smart Airport invention comes with an option of Airplane Rescuer which is required to run in circle railroad to catch airplane stuck landing wheels with the recommended railroad circle with at least 7.5 km diameter. Note that Airplane Rescuer can be optional or can be built at a later phase, but recommended to plan, build and test before the airport is operated. The Airplane Rescuer should be built and tested with at least 3 different airplane types with at least 3 different pilots to better suggestions. The testing procedure should have at least speed following and indicators following tests to make sure the pilots can able to follow the rescuer based on the following nose and indicators poles before trying to rescue land; then testing with different payloads from light to heavy which matches the common 4 engines 747 airplane payload to ensure the Airplane Rescuer can handle stability to well catching. Suggest all airplanes should have 3 cameras; one for watching the front wheel, one for the pilot to view the back wheels when needed, and one for the pilot to view the front of the airplane right at the front wheel which is great for the pilot since the airplane is high and the pilot view is too far horizontally when the airplane is tilting an angle while takeoff or landing.
The Wings Catcher Base should be built with Titanium for strong and light weight material; The Catcher Bars or Beds can be built with magnet as possible to touch and catch easier; which could be used for magnet shoes for Space Walking as a suggestion. After reviewing carefully to catch airplane stuck landing wheels for 4 engines airplanes for the common airplanes, the wings show the mass center points of engines are too far from the wings and suggest airplane maker adding a triangle to reduce shaking propagating from one engine to another during the turbulence condition phenomena, plus adding built-in fire extinguishers for self-rescue the engine when needed.
Summary: The OH SMART AIRPORT is invented with State-of-the-Art in mind with the circle building in strongest structure shape to help Air Traffic Control (ATC) view and control the entire airport better with no or less airplanes traffic while landing or takeoff. The Smart Airport building in circle shape provides closest pickup and drop-off ramps with no or less traffic lights or stop signs with shortest walking distance for the travelers. The visitors and travelers can able to explore and view entire airport, and the travelers do not have to go through the security screening gates again after check-in and get back into the lounge area for boarding. The Smart Airport in circle shape is also invented with Airplane Rescuer running around in circle to catch airplanes stuck landing wheels and invented with the Airport Emergency paths with high custom security protection for both travelers and visitors for entire airport. OH Smart Airport is invented with landing and takeoff runways on both sides; each side provides both International and Domestic runways with two floors Air Traffic Control which is intended to control International airplanes for the outer runways by the upper ATC floor and control Domestic airplanes for the inner runways by the lower ATC floor. The Smart Airport is invented with the new Multi-radar Layer Spherical shape system and the LPS -- Local positioning System for the airport and airport equipments plus recommended LPS devices for airplanes, which provides better detecting, tracking positions and calculating directions and angles of incoming airplanes better and more accurate which can be both passive and active modes to scan entire sky at once instead of rotating around to scan like the current radar system. With the circle shape, the OH Smart Airport is also perfectly designed to rescue airplanes stuck landing wheels with the Airplane Rescuer running in railroad circle until reaching the airplane landing speed to rescue the airplane safer with 3 additional cameras which are recommended for all airplanes. The Smart Airport in circle shape provides the best to handle Airport Emergency when both visitors and travelers have to be out of the building; the travelers who are already check-in will have emergency exit right at the boarding gates, and the visitors will have emergency exit paths to the ground level and exit only to two areas which are no need for security checking or screening again. The OH SMART AIRPORT, with conventional naming suggestion as “OH SMART AIRPORT”; where ‘name’ can be a city or country name plus the 3 country letters on the smart airport symbol Globe, is the promise future airport for air transportation with better viewing, exploring, and for quick check-in fast checkout in shortest walking distance with the best rescuing airplane stuck landing wheels, plus protect illegal access and better custom security check.
Reserved Applications: ['Phams Mobile Spherical Radar System' :>>> Application uses to detect unknown aircrafts or missiles for Air Defense on the move; with 3 or more radar system vehicles with equipped with the LPS devices in this radar system, the radar systems detect more accurate while moving in the battle field...]; etc...
OH SMART AIRPORT -- Trademark Serial #:99233330 -- Trademark Image would be: Quadletter Compass -- Trademark Serial #:99486165;
» [Click to View Document]; The Touch-Slide & Landing Board for Aircraft Carrier is invented with State of The Art with the great gradually slide-to-stop methodology on the railroad that gradually wider on the other side which can automatically stop the sliding board eventually with less shocks in the shortest distance on the aircraft carrier. The Touch-Slide & Landing Board is required to build with strong lightweight material with the rubber helper wheels attached to the base frame that can be used to initiate the initial speed of the board at the moment the aircraft touching that sliding board as needed, and the rail wheels rolling on the railroad when the aircraft touching the sliding board. The sliding board is set at an angle and should be always charged at the ready position at the charger station which provides electrical battery power to the Touch-Slide & Landing Board mechanical that can able to flatten the sliding board and bring the entire sliding board to the landing home before the aircraft can get to the aircraft carrier floor.
The Touch-Slide & Landing Board for Aircraft Carrier is intended to replace the existing rope/cable catching aircraft for landing which is dangerous to the pilot and the working persons on the aircraft carrier floor when the rope is broken while landing; and also provided the Accelerator Board to help aircraft takeoff faster. Figure-A1: Accelerator Board and Touch-Slide & Landing Board – Overview shows the overview of the Accelerator board and the Touch-Slide & Landing board for the existing aircraft carriers and the new Touch-Slide & Landing Board for Aircraft Carrier introduced aircraft carrier layout. The new introduced aircraft carrier is shown in later section in this invention document. Figure-A2: Accelerator Board and Touch-Slide & Landing Board for Existing Aircraft Carrier- Overview shows the existing aircraft carrier with the Accelerator Board which is recommended to build on the front of the aircraft carrier, and the Touch-Slide & Landing Board is recommended to build on the existing landing way with the same as existing landing direction. The aircraft carrier is recommended to provide with hand tugs to help towing the aircraft to the desired space to more organized aircraft parking after landing. The aircraft is also recommended to have at least a front lower view camera as shown in later section; this camera would help the pilot having a better landing view or ground view while takeoff or landing to eliminate the blind spots.
The existing rope catching for aircraft landing is dangerous and cost more spaces, more resources, cost the aircraft and pilot’s life as shown rope/cable broke while landing in the references section; and even loss the battle when the rope is broken while landing. With these Accelerator Board and Touch-Slide & Landing Board, the aircraft can takeoff faster and landing safer in the shortest distance to reduce crashed with reducing space of rope extracting and detracting mechanism under the aircraft carrier floor in the compartment. This invention is the great promise for the future of aircraft carriers for better landing and takeoff in shortest distance with more space on the aircraft carrier which can provide better and safer for the pilots and commanders deploying troops for peacean keeper around the world through the ocean with more confident.
Touch-Slide & Landing Board for Aircraft Carrier
Summary: Touch-Slide & Landing Board for Aircraft Carrier is intended to replace the existing rope/cable catching aircraft for landing with the great gradually slide-to-stop methodology on the railroad that gradually wider on the other side which can automatically stop the sliding board eventually with less shocks in the shortest distance on the aircraft carrier. The TSL board is recommended to build with strong lightweight material with the rubber helper wheels attached to the base frame that can be used to initiate the initial speed of the board at the moment the aircraft touching that sliding board as needed, and the rail wheels rolling on the railroad when the aircraft touching the sliding board. The sliding board is set at an angle and should be always charged at the ready position at the charger station which provides electrical battery power to the TSL board mechanical that can able to flatten the sliding board and bring the entire sliding board to the landing home before the aircraft can get to the aircraft carrier floor. This invention also provides the Accelerator Board to help aircraft takeoff faster, plus the new introduced aircraft carrier layout. For existing Aircraft Carrier, the Accelerator Board is recommended to build on the front of the aircraft carrier, and the Touch-Slide & Landing Board is recommended to build on the existing landing way with the same as existing landing direction. The aircraft carrier is recommended to provide with hand tugs to help towing the aircraft to the desired space to more organized aircraft parking after landing. The aircraft is also recommended to have at least a front lower view camera; this camera would help the pilot having a better landing view or ground view while takeoff or landing to eliminate the blind spots. The existing rope catching for aircraft landing is dangerous and cost more spaces, more resources, cost the aircraft and pilot’s life as shown rope/cable broke while landing in the references section; and even lost the battle when the rope is broken while landing. With these Accelerator Board and Touch-Slide & Landing Board, the aircraft can takeoff faster and landing safer in the shortest distance to reduce crashed with reducing space of rope extracting and detracting mechanism under the aircraft carrier floor in the compartment. This invention is the great promise for the future of aircraft carriers for better landing and takeoff in shortest distance with more space on the aircraft carrier which can provide better and safer for the pilots and commanders deploying troops for peacean keeper around the world through the ocean with more confident.
The existing rope catching problems: View airplanes crashed on Aircraft Carrier video clips below.
Summary: Cybercopter Flyer is invented with State of The Art design like UFO shape which is intended to replace the existing helicopter and vertical takeoff and landing aircrafts or helicopters. The Cybercopter Flyer with common regular sizes to replace helicopter is about the size of the helicopter with the blades spinning around on top which could cover about 5 meters in diameter.
The Cybercopter Flyer would have 4 main lift up engines which can be turbofan, turbojet or more advanced engines; and the 2 main turning side engines which are used to turn left or right while flying, with plus of the 2 additional pushing engines on the back to help the flyer flying faster. The Cybercopter Flyer can hover more stable than helicopter with the 4 lift up engines within the pumping protection ring and much safer than helicopter, better for highway patrol, great for rescuing, stronger for lifting, good to fly for sightseeing, great for sky diving in larger shape for military versions. The Cybercopter Flyer can be built with bigger shape and have up to 12 engines which can be used for heavy duty carrying or large and heavy transportation services with great advantage of vertical takeoff and landing with the great standier. Note that the vertical lift up engines should be built with raised top border with helical vents round to protect objects or snow falling on the top engines beside the protection of the top fan layers; and the lower thruster tilter can be built with protection dish...
Additional Info: As mentioned on the website www.TheCybercopterFlyer.com; Cybercopter Flyer can be a Remote-controlled unmanned flyer and named as Cybercopter Remouflyer which can be used for the Patrol Circle, Patrol Flyer as a flying security patrol vehicle with cameras and 2-ways communications for crowd areas and other unmanned air services which is referred to DRONE (Dynamic Remotely Operated Navigation Equipment). The conventional name "Cybercopter Flyer" which can be in short name as "Cybercopter" which means the flyer in round shape with vertical takeoff and landing mechanism, and can be with more flavor names, "Cybercopter One", "Cybercopter Fighter", "Cybercopter Lifter", "Cybercopter Rescuer", etc... The Cybercopter Flyer can be used for Air Uber service which can serve from one local Air Transportation station to another; however, the current Self-Driving cars is restricted and still not allowed widely use yet since we don't have separate roads for Self-Driving cars. If we have separate Self-Driving cars roads, then cars with Self-Driving feature would be more safer and more independently. However, Self-Driving cars can be used as Auto Following Car for Self-Driving Cars which can be a great service for Car Rental that the customer can rent a car from anywhere and the rental car can be followed a Car Rental Service driver car for car rental delivery. The Cybercopter Flyer would be come more popular and high demand for traveling city-to-city and even for country-to-country Air Transportation with across the borders. Beyond the Air Transportation, the Cybercopter Flyer with additional small thrusters to adjust altitudes/positions while docking or releasing in space, can be used for Space Programs with enough fuel and energy to fly higher altitude to space and farther "outside of border", the Cybercopter Flyer can be used to carry human to Space Station; and carry tools, equipments and machines to build Space Station and go back to the earth safer compare to current Space Launchers... For country border security and for future private air transportation, I introduced the Smart Border with cameras, warning lights and sirens which can be built with propagation communication one pole to another with solar power and connect to the border patrol stations based on the idea from my inventions, LPS -- Local Positioning System and LPS Navigation System for high border security... However, Smart Border can be built with satellite communication and access via internet but cameras must have enough power and equipped with satellite communication devices for border region without internet signal coverage...
NOTICE: New words are introduced in this invention document, ‘Elevadoor’ is the door in the elevator, and ‘Liftier’ is the Lift-i-er lifting system, ‘Standier’ is stand of the machine with leg that can stand with control of mechanical (Stand-i-er).
Cybercopter Flyer -- Trademark Serial #:99228109 -- Trademark Image would be:
Summary: Hybrid Tire The Hybrid Air & Rubber Cells Layer is the layer to protect nails or other sharp objects that may cut the outer part of the tire along the treads; this layer is recommended with at least 2 inches to protect the common nails and would come with different rubber cells patterns. With additional option of padding foam into the rubber cells holes which can be used material such as Neoprene foam pads or similar with medium to high density, lightweight and durable, the foam can stay in shape with high PSI pressure and temperature during the final curing process. The rubber cells layer would be strong enough to protect the tire even when the tire got a big nail or a hole at the lower tire, and this layer would be strong enough without air and would provide great momentum when the wheel is rotating. The inner tire would be air tire layer like the existing tire, and the process of overlapping rubber sheet for inner tire would be the same as the existing tire of the standard manufacturing processes. The rubber cells layer would be also overlapping around the inner air tire after the overlapping process of the inner tire. The Hybrid Air & Rubber Cells Layer Tire or Hybrid Tire in short name is the great promise for future of tire manufacturing for cars, trucks and even air planes to prevent flat tire and reduce maintenance while the tire can provide great momentum for the whole wheel with strong support of the rubber cells layer.
NOTICE: For references of the existing tire manufacturing processes, please visit https://en.wikipedia.org/wiki/Tire_manufacturing for more details.
Hybrid Tire -- Trademark Serial #:99233262 -- Trademark Image would be:
Summary: One Round Chamber The One Round Chamber is invented with State-of-the-Art design which has multi-level drum
rotating back-and-forth in 360° in one round circle and kept the wires in shortest length without twisting to provide greatest capacity of loading for testing devices with temperature and humidity environment plus vibration control option. The One Round Chamber provides at least four times of current chambers or testers in loading capacity around all sides in 360° surface instead of traditional one side loading. One Round Chamber also provides with the built-in vibration mechanism option with 4 inner vibration triggers and 4 outer vibration triggers which can provide up to 63 combinations of vibrations patterns. One Round Chamber is designed with the center cylinder which can easy have all the wires installed and connected from the Ethernet Router and Switches, Monitor Switches and computer server with USB Virtual Keyboard and Webcam options that allow the users to control, setup, install and view every single node computer via switching monitors and the server where the users can access remotely for a great support of Automation Testing in Manufacturing. One Round Chamber with 6 levels and each level with 16 node computers, provides a great testing capacity compare to other chambers; with the common testing devices like Hard Drives and each node computer can handle 4 Hard Drives, the chamber can have the testing capacity up to 384 drives; and one node computer handle 8 drives with total capacity up to 768 drives. One Round Chamber is the great promise for future of the devices tester or testing devices chambers that can provide great in load capacity which can help to reduce more than 4 times in space of the manufacturing, provide great in testing thermal convectional environment, great in controlling, setting, installing, debugging and viewing the node computers from anywhere remotely via internet or local network connection to save money and resource for companies and manufacturers.
One Round Chamber -- Trademark Serial #:99486159 -- Trademark Color Image:
Summary: 360° Stand G-Rotator Fan is invented with State-of-the-Art with unique look-and-feel stand fan and intended to replace the existing stand fans. The top level can be a heater, air evaporating cooler, air humidifier, standing light or other utilities. The G-Rotator Fan comes with a chargeable battery at the bottom as the base charger station and prevents overloading of power usage which also comes with the on-brake caster wheels locking mechanism that blocks the stand from moving and allow moving by a press-and-hold handle on the stand tube pole for safety purposes. The G-Rotator Fan provides a standard control with the same remote control which can control the heater, cooler, air humidifier, quadrant light, star night light, galaxy projector or any other utilities on the top level with at least 4 different modes and 4 different sides, front, back, left and right. The G-Rotator Fan is perfect stand fan for both indoor and outdoor fan with heater and cooler. With these great features and functions plus attachable and detachable device support on top level, the G-Rotator Fan is great promise for future of stand fan with.
The Cylinder Helical Stair is the stair with a holdable pole at the center within a cylinder. This invention is part of the OH SMART Airport which is used for Rotatable Coffee shop & Air Traffic Control room with compact size within the cylinder. The Emergency Cylinder Helical Stair can have an option to support slidable without electrical power with one person per board. The board can be 1 feet width and within the side of the stair step and one side on the rail which is built attached to the cylinder and the other end attached (50+% to the center pole); and the boards can be stacked one on top another after the latch got trigger at the last step by the slide board and pushed down to stack up; and the board can be removed by hand from the upper level on the ceiling one by one which was pre-attached on the rail and the pole; and the stair can be setup by pulling up for next emergency later after electrical is on... However, this invention will be made separately to support consumer...
INVENTION TITLE: Personal One Step Escalator; The Personal One Step Escalator is the vertical escalator with just one step (board) to get from one floor to another, and intended for personal use which means one person at a time and the escalator travel up/down using one step with buttons control. This invention is part of the OH SMART Airport which is used for the Air Traffic Control room with multiple levels option within the same room to allow Airport Control Personnels to get up/down to their level within the same room for better communication and to reduce space and building structure...However, this invention will be made separately to support consumer...
The Smart Gear Belt Cart Exchanger system requires each cart comes with hook for Cart-to-Cart hook to connect together as a patch to roll up/down easier. The Cart Exchanger belt requires gears on top and each gear will roll the cart roll-bar which is built-in with the cart. The carts will slide on top of a surface (or a roller surface without motor); the motor requires for the Gear Belt only to hold-up and move the carts on the Gear Belt...
INVENTION TITLE: Matrix Base Keyboard; This invention, which has been mentioned in year 2022 and pasted as the last link on the main web page (www.TheCloudOSCenter.com), is the promise for the future of the Cloud OS computers to prevent hacking by Wireless Keystroke Logger... The Matrix Base Keyboard will be configurable keys. The Base Matrix is matrix of electro-sensitivity or variable resistant with rows and columns. This key base will create unique key to provide un-hackable keyboard. Each key can be changed by turning to change the sense pattern or the resistant of the key The base must has one output terminal for the total output resistant of key or pressed-keys to determine key(s). Trademark #: 99486130
invention will help vehicles, cars, trucks, motor cycles, etc... to equip with knot-transponders; each knot-transponder represents for a letter or a number for easier tracking vehicles passing by a gate or an entrance to identify the license plate number easier with the purpose of tracking for missing vehicles or pin point parking location with a smart parking system...
INVENTION TITLE: Auto Tracking Target Network Security Cameras System;Auto Tracking Target Network Security Cameras System invention is the network of cameras which can be used in a crowed environment like airport, to help the security officers tracking a selected target with auto tracking and following the target from one camera to another and display in one monitor with information of the current camera number and location...
invention (a 20 years idea) will apply Machine Intelligence to help patients for regular checkup with more comfortable interactive with Robot Medical Doctor for any health conditions...
The theorems:
[1] - All spheres are parallel, and they are only different in form of percentage.
[2] - All circles are parallel on the same surface or on other parallel surfaces, and they are only different in form of percentage.
[3] - All lines, shapes, and objects are zoomified, are parallel transforming from its original, and they are only different in form of percentage.
[4] - A line that parallels with a side of a triangle will divide the other 2 sides into the same percentage on both sides as well as its parallel side.
[5] - A line that parallels with the bases of a trapezoid will divide the 2 sides into the same percentage on both sides, and this line is equal to the small base plus the parallel percentage of the difference of the 2 bases.
[6] - Ellipse is a closed curve with the perimeter that divides all the chord lines of the outer circle with radius R that parallel with the fixed short radius r of the ellipse into the same percentage on each chord line for all the chord lines with the same percentage of r/R.
[7] - The e-chords are the n lines adjacent to the n equal angles in a circle where n>2, are equal to 2 times of the circle radius multiply by sine of ꙥ/n.
[8] - The e-chord shape with all n sides equal is the largest shape compares to other shapes with the same number of n chord lines that are not equal in a circle, and the shape with more e-chord lines has larger area.
[9] - The rectangle in an ellipse which belongs to the e-chord square of the outer circle of the ellipse, has the largest area with the width equals to √2 multiply by the fixed long radius R, and the height equals to √2 multiply by the fixed short radius r of the ellipse. Click here to view full document of the theorem.
And, click the link to view The 9 PTP Theorems in Vietnamese which have been posted on my Facebook on December 1, 2023.
Laws of Mass Center Point
Four Points on Ellipse Theory: “Four points on a surface lay on an ellipse curve when all points are laid on different sides of their crossing lines.” -- Henry V. Pham.
“The light itself cannot produce any colors, only the medium which contains color atoms that the light goes through can produce colors.” -- Henry V. Pham. Note that the prism is in Triangle Block which produces different thickness that causes the light bending and goes through different number of color atoms... Click here to view detail of the theory which has been posted here in Facebook.
“The photons go through the medium which contains color atoms will carry colors with them to become color photons.” -- Henry V. Pham.
Heat & Spark on Touching & Sliding Theory:“When two or more objects in the same environment are touching or sliding on each other with damaging of material or structure, the heat will be generated with possible emitted sparks or electrical sparks could be happened with electrical potentials.” -- Henry V. Pham.
The Earth rotates 1 revolution per day, and spins around the Sun 1 per year.
"Your shoes weight almost or equal to 1 (one) Kg, but the Earth weights almost or equals to 0 (zero) Kg."
-- Henry V. Pham
Based on the public Wiki data, the earth radius is 6,378 km, circumference is 40,074 km, then the rotating velocity at a given point on earth about 1,670 km/h; The earth distance from the Sun about 150,000,000 km, then velocity of the earth flying around the Sun about 107,589 km/h; We don't have any airplane or missile flying that fast...
We live on earth, and the earth planets branch is just part of the Universe which spins around the Sun. How can we see the stars at night? The Earth spins around the Sun once per year, and the stars at night we see the same every seasons... We live in this Universe in a close-universe container with Neuclear Radiation Protection, and the entire container spins around, then the entire Earth branch we live in spins with the close-universe container. There could be giant Quantum Neuclear power out there spins the entire our Universe. The Sun with full of Neuclear power and closer to the Earth in summer time, and the Sun with less Neuclear power and farther to the Earth on other seasons. And the Earth spins with the close-universe container through 4 corners to have 4 different seasons. So, are there giant real physical Gods, which we call the Heaven, working to keep the entire Universe running? Most likely! We are the lucky human living on Earth, the perfect planet for human that the Heaven gave it to us! And there are people on other planets that may already visited the earth like we have heard, UFO, and could be more...
Frequency and Wavelength Reduced Gradually Theory:“The frequency could be reduced gradually, and the wavelength could be gradually shorter in distance of traveling due to weaker of wave power. If we could measure the change of wavelength in certain distance, we then may know where the source is and adjust the receivers to receive better in farther distance.” --- Fun Hint Phrases:
"All waves start from water wave."; and "Always start from water wave."; then "Both ways start from water wave." -- Henry V. Pham.
“The light itself cannot produce any colors, only the medium which contains color atoms that the light goes through can produce colors.” Click here to view detail of the theory which has been posted here in Facebook on 2023/07/31.
“Chicken egg takes many days to hatch. Fish dead takes many days to reek... Everything will come at day!” Click here to view detail which has been posted here in Facebook on 2022/09/20.
“Fortune relies on Daddy! Lovelife relies on Mommy! Unified the family together! Create one happiness family!” Click here to view detail which has been posted here in Facebook on 2022/03/28.
“Want to accomplish great job, first you have to accept the fact! Want to be greater than others, first you have to accept yourself! When you've completed great accomplishment, then you can realize your ability! When you have no shortcoming, then you know you are greater than others!” Click here to view detail which has been posted here in Facebook on 2022/03/17.
is the Java application utility to allow the users prepare text data files in random or sequential alpha-numeric to generate G-CODE Labels, G-CODE Product Icons or G-CODE Profiles. This is also a Java application and needs JRE to run...
is the Java zip application with high secured encryption of 4K Number Encryptor to make it impossible to revert engineer to user's zip passwords. Password and Magic Number will go through the sequence of the 4K Number Encryptor (the 4K Password in short word). Note that this is Java application and it needs to run with JRE (Java Runtime Environment), please check your Windows system for JRE installed by open Command Prompt and type 'C:\>java -version'. If your Windows system does not have JRE installed, then go back to the main page and look for the banner "Download & Install Java JRE to run Java Application". The ZFilePackager application can be downloaded from the main page, then unzip to a 'C:\' folder (recommend folder name without spaces) and look for file name ZFilePackager.jar, you can double click to run this application...
is the Java Windows application for "Windows 10" helps users to kill hacked processes to prevent their Windows PC from hackers. This application is required to run with command line under Administrator mode or set this app to run in System Task Scheduler when login into the Windows System. This application can be downloaded the unzip to a 'C:\' folder (recommend folder name without spaces) and look for the batch file to start the application in Administrator command prompt 'StartHackedProcessKiller.bat'. When running this app and suspect a hacked process, be sure to try option '(1): Kill the selected process one time!' from the right-click of a selected process in the 'green color Windows process table' and make sure this process is killed without crashing (If your system crashed, it will restart and backup with this option. You can copy & paste the selected suspect hacking process somewhere or write it down...). Then, next time this process comes back again you can use option '(2): Kill the selected process repeatedly when it comes again!'...
with the 4K Password which is intended to replace SVN, CVS, Bitbucket, Git, or any other source control or file revisions control applications for higher secured encryption with the new 4K Number Encryptor which has been used in the ZFilePackager application (4K Number Encryptor is intended to replace the MD5, SHA-256 or any other existing encryptions). ...
provides 360° of derivative vectors for each modeling circle. Developers will have a complete software modeling with more clean code and easy coding maintenance from small to larger infrastructure software architecture development...[1]Controllers: -> Events/Actions Controls; [2]Observers: -> Events/States/Monitors of data/objects/components Observers.; [3]Models: -> Data Models.; [4]Views: -> UI/Console Display/Data Output...;[5]Error-Handlers: -> Handle hardware/firmware/software/IO errors.; [6]Conditions: -> Error conditions, Permission conditions, etc...;[7]Components: -> HW/SW components.;[8]Interfaces: -> Defined common protocols.;[9]Reporters: -> Report data, actions summary, customer choices, etc... This UIX SW Model is a promise for the future of world infrastructure of Software Architecture which can be used for Machine Intelligence for coding generation. This universal model also applicable for hardware or firmware for smart system
by the new USC-LI table (Unified Standard Code Language Information table) which supports all languages around the world with markup tags for Language Codes & Language Fonts, plus pre-translated common phrases codes and common symbols/icons codes. The current ASCII Table is only used English characters with many unused symbols with the same total of 256 characters of 1 byte value. The new USCLI-Table replaced the unused characters in ASCII table by other Latin characters with markup tags to support all current UTF-8, UTF-16 or UTF-32 or can be redefined with new language codes for non Latin languages. The new USCLI-Table keeps the same English character values from ASCII table (Example: 0-9;A-Z;a-z with the same hexadecimal values 0x30-0x39;0x41-0x5A;0x61-0x7A) for easier converting from the existing documents to the new Cloud OS literal language with minimal changes in software...
provides the users with the secured tool with an option to recover their applications, other secured services or encryption passwords features like the ZFilePackager applications or any secret keys that the users want to keep as secret within their Cloud OS account, etc... Keep in mind that the Cloud OS account passwords itself does not provide passwords recovery for security purposes, and because the Cloud OS authenticate the user passwords in several sequences and the raw-passwords will be transformed into the 4K Number for high secured purposes. However, when the user create a Cloud OS account, the Cloud OS will provide an option to have one Initial Password & one Unlock Password to keep as a key-pair passwords to unlock the account when the account is in suspended or locked mode. This Passwords Recovery feature will help the parents a secured method to save and to recover their children's passwords in this secured tool to prevent someone else peeping of full passwords display; This feature is also useful for organization and company...
can be used for Cloud OS mobile devices login to support on the road login. Each image will go through the sequences of the 4K Number Generator and the Cloud OS will use this 4K image number to represent for that image...
Keyboard can be built with foldable Configurable Matrix Base Keyboard Concept to allow the users configure single key signal to prevent from key stroke logger by keyboard. However, Cloud OS will support handwriting with handwriting recognition for only the user of the Cloud OS account for more accurate and more secured. Cloud OS will also support pen mouse (stilus or ëPen) which can be used to write the login passwords on the table without ink (invisible) to login...
Others: There are lot more ideas and features and already defined in my Cloud OS guideline like the new Cloud OS Email application with better layout and email rules and policies. The email address in new form <"First.Last">@ë<"CityName">.mail, <"First.Last">@ë<"Company">.mail, <"First.Last">@ë<"Organization">.mail, and share box <"First.Last">@ë<"CityName">.βox, <"First.Last">@ë<"CityName">.βox, <"First.Last">@ë<"CityName">.βox; The company or organization can be '.com', '.net', '.org' or anything else but not '.mail' and '.βox'. Other applications like Language Writer, Language Reader, etc...
Mathematics References:
I have introduced the general 3-Dimension Mathematic Form,
for Multifunctional Polynomial Equations and Multophantine Equations; -- Click the link to view more about my MULTOPHANTINE EQUATIONS and THE UNIVERSE EQUATIONS which were expanded from the THE DIOPHANTINE EQUATION problem solvation of Ran Van Vo.
Ran Van Vo gave me a soft copy of the book before he published and printed his books for sale on Amazon and other Book Stores. Please visit the book
which has been proven and solved by Ran Van Vo, my uncle on my mom side who lived in the same hometown Binh Son, Quang Ngai, VIETNAM and came to the United States in 1990 as a military and political immigrant with his wife Sen Thi Tran with two daughters and two sons live in Wichita, Kansas. Thanks for his great works and contributions to our Mathematic World with that many years of works and solved the World Millennium Difficult Mathematic Problems which he had told and gave the copy to me several times since early year 2000s before he published his books. I have helped him to use LaTeX Script to create document to submit initially during year 2002 and 2003 several times when he came to California; He needed help in English and LaTeX Script but I then was busy with my works and later he could able to published his books but got struggles with Mathematic Awards which he had mentioned and wrote in his Vietnamese Mathematic Book with the title 'Toán Học Bình Dân' which can be bought from www.Amazon.com plus his other books...
He should had received World Mathematic Awards plus additional Award from www.claymath.org where the 7 World Millennium Mathematic Problems were posted in year 2000... I posted his works here for evidences which he gave to me as a copy before he published his books! His works are more than just the diophantine equations/problems solvations, he also proved the
The Universe Equations -- Created by: Henry V. Pham
AI - Artificial Intelligence References:
AI, what is AI?AI stands for Artificial Intelligence. AI is a software which applies Machine Learning (ML) that human want to train a machine or a computer to learn what human already know like repeated patterns, common things or similar behaviors and feeding or mining into the machine or computer memory for the Software to recognize faster. Machine Learning was invented several decades ago, and it is widely used for the good things like Handwriting Recognition (recognize every letter or number for each person handwriting style), Voice Recognition (recognize every word for each person speaking tone style or frequency), Face Recognition (recognize face of a person in different angle with different emotions; and even the Face Recognition can predict your future face if you give out too often photo picture frequently every month or so), Disease Recognition (recognize every disease for each race or nationality with similar things in common), and many other features or wares that have been used in computer to learn the behaviors of a computer user then feed the user with the favorite shopping items, favorite food dishes, etc…
However, we want the AI to be more growing of learning, the programmers or managing persons of AI would feed or mining new data and adjust or tune the AI software to learning new collected data or info that the programmers of AI have not yet predicted or programmed into the AI system. One of AI application that current uses in Self-Driving car to identify the roads, lanes, traffic objects, distance from other cars, etc… The Self-Driving car manufacturers need time to tune their AI in the car to learn until the system mature enough to handle all road and traffic conditions to release the Self-Driving cars for the consumers. Note that Cloud OS will apply Machine Learning for Machine Intelligence (MI) with the principle of Self-Manage & Self-Control, and Self-Manage & Self-Grow for for dynamic growing of World eWeb Data Topology Center and for Smart Machine or Machine Intelligence to prevent hijacking Cloud OS server machines and prevent hacking with the Cloud OS ëMarshall which was mentioned as Neighbor-to-Neighbors Checking Methodology and Neighbor-to-Neighbors Routing Technology plus the Dynamic Cloud OS Protocols, etc...
But, besides the good things that applied Machine Learning for AI, the AI can collect your personal info, personal data, personal behaviors, personal activities, personal photo picture frequently and mining into the AI system to learn and recognize. Keep in mind that AI is a Software which is written by the AI programmers for certain group to serve certain things, and there are many different kinds of AI Software out there and many of them can be combined and integrated into our World Wide Web internet to collect data for data mining. Machine Learning in AI do the repeated things and patterns recognitions things for us, this is the good thing, but there are always Pros and Cons or abusive…...