摘要:
Described is an electro-optical apparatus and method for correcting myopia that includes at least one adaptive lens, a power source, and an eye tracker. The eye tracker includes an image sensor and a processor operatively connected to the adaptive lens and the image sensor. The processor is configured to receive electrical signals from the image sensor and to control the correction power of the adaptive lens to correct myopia, with the correction power dependent on a user's gaze distance and myopia prescription strength. A lower-power-consumption method of eye glint tracking is further described.
摘要:
A receiver monitoring the transmissions of a packet processing device such as a wireless access point analyzes the monitored transmissions to estimate the probability of packet loss due to buffer overflow in the processing device. The loss probability can be estimated for individual packets to follow rapid changes in communication conditions. An indication of the estimated loss probability can be used to adapt the forward error correction (FEC) parameters that are used to generate the packets, thereby improving the reliability of data delivery to a receiver while optimizing the use of communication channel bandwidth.
摘要:
A value is computed for a feature in an instance of query content and compared to a threshold value. Based on the comparison, first and second bits in a hash value, which is derived from the query content feature, are determined. Conditional probability values are computed for the likelihood that quantized values of the first and the second bits equal corresponding quantized bit values of a target or reference feature value. The conditional probabilities are compared and a relative strength determined for the first and second bits, which directly corresponds to the conditional probability. The bit with the lowest bit strength is selected as the weakbit. The value of the weakbit is toggled to generate a variation of the query hash value. The query may be extended using the query hash value variation.
摘要:
Bit errors in packets of data that are communicated in a network such as a wireless network can be corrected by processes that do not require any overhead in the data such as conventional error-detection codes or redundant information such as conventional error-correction codes. A validation-set process compares corrupted data against values in a set of known valid values and selects one of the known valid values to replace the corrupted data. A consistency-check process uses data correlation characteristics of two or more parameters to determine if values obtained from a packet are consistent with one another. If not, values are changed to make them consistent.
摘要:
A method of processing a call request to a callee in a network telephony system is provided which includes mapping a hostname portion of a callee address to a canonical form of the hostname and determining a canonical form of a username portion of a callee address. The canonical form of the user identity of the callee is then used as an index to a user database to retrieve a callee database record. The callee database record is then used to determine call routing based on the retrieved callee database record, such as user location, preferences and policy data stored in the record. The method is generally performed by a signaling server in the network, such as a SIP proxy server. The signaling server can also provide security features such as caller authentication. A scalable signaling and routing architecture is also provided.
摘要:
Fingerprint-based content identification is described. Bin-counting detects linear trends based on data points that are generated from a set of query fingerprints, which are extracted from a query content item and a matching set of corresponding reference content items that are extracted from a reference content item. RANSAC may detect trends based on confidence scores that are computed for multiple candidate content items. The trends detected for the candidate content items are compared against a threshold in order of decreasing confidence score until a trend that satisfies the threshold is found. A ranking-based mechanism for fingerprint-based content identification may use a bin-counting or RANSAC-based trend detection mechanism to identify duplicate or multiple reference content items that all match the same query content item.
摘要:
The present invention may be used to estimate operational characteristics of devices that transmit and receive streams of information in a communication system. In one application, the level of occupancy of a FIFO buffer in a processing device such as a router or wireless access point is estimated by monitoring packets transmitted by the processing device. Estimates of the operational characteristics can be used to control communications in the system so that the overall performance is improved. Techniques that can be used to mitigate effects of low signal-to-noise ratio conditions are also disclosed.
摘要:
Fingerprint-based content identification is described. Bin-counting detects linear trends based on data points that are generated from a set of query fingerprints, which are extracted from a query content item and a matching set of corresponding reference content items that are extracted from a reference content item. RANSAC may detect trends based on confidence scores that are computed for multiple candidate content items. The trends detected for the candidate content items are compared against a threshold in order of decreasing confidence score until a trend that satisfies the threshold is found. A ranking-based mechanism for fingerprint-based content identification may use a bin-counting or RANSAC-based trend detection mechanism to identify duplicate or multiple reference content items that all match the same query content item.
摘要:
The present invention may be used to estimate operational characteristics of devices that transmit and receive streams of information in a communication system. In one application, the level of occupancy of a FIFO buffer in a processing device such as a router or wireless access point is estimated by monitoring packets transmitted by the processing device. Estimates of the operational characteristics can be used to control communications in the system so that the overall performance is improved. Techniques that can be used to mitigate effects of low signal-to-noise ratio conditions are also disclosed.
摘要:
Processors that encrypt frames of data representing images and sounds, for example, use a first encryption process to encrypt control data that includes selected data from the data frames and use a second encryption process to encrypt non-selected data from the data frames. The first encryption process is responsive to a key, which may be associated with an intended recipient of the data frames. The second encryption process is responsive to a key that is obtained or derived from the control data. The encrypted control data and the encrypted non-selected data may be delivered to a receiver using separate media. The receiver recovers the data frames using decryption processes that are inverse to the first and second encryption processes. Efficient implementations of the second encryption process are disclosed.