Transient analysis of packet queuing loss in a broadcast network
    22.
    发明授权
    Transient analysis of packet queuing loss in a broadcast network 有权
    广播网络中数据包排队丢失的瞬态分析

    公开(公告)号:US08274906B2

    公开(公告)日:2012-09-25

    申请号:US12310181

    申请日:2007-08-16

    申请人: Wenyu Jiang

    发明人: Wenyu Jiang

    IPC分类号: H04L12/26

    摘要: A receiver monitoring the transmissions of a packet processing device such as a wireless access point analyzes the monitored transmissions to estimate the probability of packet loss due to buffer overflow in the processing device. The loss probability can be estimated for individual packets to follow rapid changes in communication conditions. An indication of the estimated loss probability can be used to adapt the forward error correction (FEC) parameters that are used to generate the packets, thereby improving the reliability of data delivery to a receiver while optimizing the use of communication channel bandwidth.

    摘要翻译: 监视诸如无线接入点之类的分组处理设备的传输的接收机分析所监视的传输以估计由于处理设备中的缓冲区溢出引起的分组丢失的概率。 可以估计各个数据包的丢失概率跟随通信条件的快速变化。 可以使用估计丢失概率的指示来适应用于生成分组的前向纠错(FEC)参数,从而在优化通信信道带宽的使用的同时提高向接收机的数据传递的可靠性。

    Non-Parametric Measurement of Media Fingerprint Weak Bits
    23.
    发明申请
    Non-Parametric Measurement of Media Fingerprint Weak Bits 有权
    媒体指纹弱位的非参数测量

    公开(公告)号:US20120011128A1

    公开(公告)日:2012-01-12

    申请号:US13173462

    申请日:2011-06-30

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30023

    摘要: A value is computed for a feature in an instance of query content and compared to a threshold value. Based on the comparison, first and second bits in a hash value, which is derived from the query content feature, are determined. Conditional probability values are computed for the likelihood that quantized values of the first and the second bits equal corresponding quantized bit values of a target or reference feature value. The conditional probabilities are compared and a relative strength determined for the first and second bits, which directly corresponds to the conditional probability. The bit with the lowest bit strength is selected as the weakbit. The value of the weakbit is toggled to generate a variation of the query hash value. The query may be extended using the query hash value variation.

    摘要翻译: 为查询内容的实例中的要素计算一个值,并与阈值进行比较。 基于比较,确定从查询内容特征导出的哈希值中的第一和第二比特。 对于第一和第二比特的量化值等于目标或参考特征值的相应量化比特值的可能性,计算条件概率值。 比较条件概率,并确定第一和第二位的相对强度,其直接对应于条件概率。 选择具有最低位强度的位作为弱位。 切换弱点的值以生成查询哈希值的变体。 可以使用查询哈希值变化来扩展查询。

    Error correction in packet-based communication networks using data consistency checks
    24.
    发明申请
    Error correction in packet-based communication networks using data consistency checks 有权
    使用数据一致性检查在基于分组的通信网络中进行纠错

    公开(公告)号:US20070089037A1

    公开(公告)日:2007-04-19

    申请号:US11242435

    申请日:2005-09-29

    申请人: Wenyu Jiang

    发明人: Wenyu Jiang

    IPC分类号: H03M13/00

    CPC分类号: H04L1/0045 H04L1/18

    摘要: Bit errors in packets of data that are communicated in a network such as a wireless network can be corrected by processes that do not require any overhead in the data such as conventional error-detection codes or redundant information such as conventional error-correction codes. A validation-set process compares corrupted data against values in a set of known valid values and selects one of the known valid values to replace the corrupted data. A consistency-check process uses data correlation characteristics of two or more parameters to determine if values obtained from a packet are consistent with one another. If not, values are changed to make them consistent.

    摘要翻译: 在诸如无线网络的网络中传送的数据的数据包中的位错误可以通过不需要诸如常规错误检测码或诸如常规纠错码的冗余信息的数据中的任何开销的处理来校正。 验证集过程将损坏的数据与一组已知有效值中的值进行比较,并选择一个已知有效值来替换损坏的数据。 一致性检查过程使用两个或多个参数的数据相关特征来确定从数据包获得的值是否彼此一致。 如果没有,值被改变以使它们保持一致。

    Trend analysis in content identification based on fingerprinting
    26.
    发明授权
    Trend analysis in content identification based on fingerprinting 失效
    基于指纹识别的内容识别趋势分析

    公开(公告)号:US08635211B2

    公开(公告)日:2014-01-21

    申请号:US13376584

    申请日:2010-06-10

    IPC分类号: G06F7/00

    摘要: Fingerprint-based content identification is described. Bin-counting detects linear trends based on data points that are generated from a set of query fingerprints, which are extracted from a query content item and a matching set of corresponding reference content items that are extracted from a reference content item. RANSAC may detect trends based on confidence scores that are computed for multiple candidate content items. The trends detected for the candidate content items are compared against a threshold in order of decreasing confidence score until a trend that satisfies the threshold is found. A ranking-based mechanism for fingerprint-based content identification may use a bin-counting or RANSAC-based trend detection mechanism to identify duplicate or multiple reference content items that all match the same query content item.

    摘要翻译: 描述基于指纹的内容识别。 二进位计数基于从查询内容项提取的一组查询指纹和从参考内容项提取的对应参考内容项的匹配集合生成的数据点来检测线性趋势。 RANSAC可以基于针对多个候选内容项目计算的置信度分数来检测趋势。 将候选内容项目检测到的趋势与阈值进行比较,以降低可信度得分,直到找到满足阈值的趋势为止。 用于基于指纹的内容识别的基于排名的机制可以使用二进位计数或基于RANSAC的趋势检测机制来识别所有匹配相同查询内容项的重复或多个参考内容项。

    Estimating wireless processing device queue length and estimating signal reception quality in a wireless network
    27.
    发明授权
    Estimating wireless processing device queue length and estimating signal reception quality in a wireless network 失效
    估计无线网络中的无线处理设备队列长度和估计信号接收质量

    公开(公告)号:US08437255B2

    公开(公告)日:2013-05-07

    申请号:US12984766

    申请日:2011-01-05

    申请人: Wenyu Jiang

    发明人: Wenyu Jiang

    IPC分类号: H04L12/26 H04L12/56

    摘要: The present invention may be used to estimate operational characteristics of devices that transmit and receive streams of information in a communication system. In one application, the level of occupancy of a FIFO buffer in a processing device such as a router or wireless access point is estimated by monitoring packets transmitted by the processing device. Estimates of the operational characteristics can be used to control communications in the system so that the overall performance is improved. Techniques that can be used to mitigate effects of low signal-to-noise ratio conditions are also disclosed.

    摘要翻译: 本发明可以用于估计在通信系统中发送和接收信息流的设备的操作特性。 在一个应用中,通过监视由处理设备发送的分组来估计诸如路由器或无线接入点之类的处理设备中的FIFO缓冲器的占用水平。 操作特性的估计可用于控制系统中的通信,从而提高整体性能。 还可以公开可用于减轻低信噪比条件影响的技术。

    Trend Analysis in Content Identification Based on Fingerprinting
    28.
    发明申请
    Trend Analysis in Content Identification Based on Fingerprinting 失效
    基于指纹识别的内容识别趋势分析

    公开(公告)号:US20120078894A1

    公开(公告)日:2012-03-29

    申请号:US13376584

    申请日:2010-06-10

    IPC分类号: G06F17/30

    摘要: Fingerprint-based content identification is described. Bin-counting detects linear trends based on data points that are generated from a set of query fingerprints, which are extracted from a query content item and a matching set of corresponding reference content items that are extracted from a reference content item. RANSAC may detect trends based on confidence scores that are computed for multiple candidate content items. The trends detected for the candidate content items are compared against a threshold in order of decreasing confidence score until a trend that satisfies the threshold is found. A ranking-based mechanism for fingerprint-based content identification may use a bin-counting or RANSAC-based trend detection mechanism to identify duplicate or multiple reference content items that all match the same query content item.

    摘要翻译: 描述基于指纹的内容识别。 二进位计数基于从查询内容项提取的一组查询指纹和从参考内容项提取的对应参考内容项的匹配集合生成的数据点来检测线性趋势。 RANSAC可以基于针对多个候选内容项目计算的置信度分数来检测趋势。 将候选内容项目检测到的趋势与阈值进行比较,以降低可信度得分,直到找到满足阈值的趋势为止。 用于基于指纹的内容识别的基于排名的机制可以使用二进位计数或基于RANSAC的趋势检测机制来识别所有匹配相同查询内容项的重复或多个参考内容项。

    Estimating Wireless Processing Device Queue Length and Estimating Signal Reception Quality in a Wireless Network
    29.
    发明申请
    Estimating Wireless Processing Device Queue Length and Estimating Signal Reception Quality in a Wireless Network 有权
    估计无线网络中的无线处理设备队列长度和估计信号接收质量

    公开(公告)号:US20100165872A1

    公开(公告)日:2010-07-01

    申请号:US12226239

    申请日:2007-04-09

    申请人: Wenyu Jiang

    发明人: Wenyu Jiang

    IPC分类号: H04L12/26

    摘要: The present invention may be used to estimate operational characteristics of devices that transmit and receive streams of information in a communication system. In one application, the level of occupancy of a FIFO buffer in a processing device such as a router or wireless access point is estimated by monitoring packets transmitted by the processing device. Estimates of the operational characteristics can be used to control communications in the system so that the overall performance is improved. Techniques that can be used to mitigate effects of low signal-to-noise ratio conditions are also disclosed.

    摘要翻译: 本发明可以用于估计在通信系统中发送和接收信息流的设备的操作特性。 在一个应用中,通过监视由处理设备发送的分组来估计诸如路由器或无线接入点之类的处理设备中的FIFO缓冲器的占用水平。 操作特性的估计可用于控制系统中的通信,从而提高整体性能。 还可以公开可用于减轻低信噪比条件影响的技术。

    Codec-independent encryption of material that represents stimuli intended for human perception
    30.
    发明申请
    Codec-independent encryption of material that represents stimuli intended for human perception 审中-公开
    编码代码独立加密表示用于人类感知的刺激的材料

    公开(公告)号:US20100014669A1

    公开(公告)日:2010-01-21

    申请号:US12309342

    申请日:2007-07-13

    申请人: Wenyu Jiang

    发明人: Wenyu Jiang

    IPC分类号: H04L9/00 H04N7/167

    摘要: Processors that encrypt frames of data representing images and sounds, for example, use a first encryption process to encrypt control data that includes selected data from the data frames and use a second encryption process to encrypt non-selected data from the data frames. The first encryption process is responsive to a key, which may be associated with an intended recipient of the data frames. The second encryption process is responsive to a key that is obtained or derived from the control data. The encrypted control data and the encrypted non-selected data may be delivered to a receiver using separate media. The receiver recovers the data frames using decryption processes that are inverse to the first and second encryption processes. Efficient implementations of the second encryption process are disclosed.

    摘要翻译: 例如,加密表示图像和声音的数据帧的处理器使用第一加密处理来加密来自数据帧的包括所选数据的控制数据,并使用第二加密处理来从数据帧加密未选择的数据。 第一加密过程响应于可能与数据帧的预期接收者相关联的密钥。 第二加密过程响应于从控制数据获得或导出的密钥。 加密的控制数据和加密的未选择的数据可以使用单独的介质传送到接收机。 接收机使用与第一和第二加密过程相反的解密过程恢复数据帧。 公开了第二加密过程的高效实现。