摘要:
A device and process which eliminates potential moiré patterns in digitized images by employing a one-dimensional sensor array and a sampling method of the sensor signals which produces a data set of non-uniformly spaced sensor positions. This allows the spacing of the sensors to avoid having a strong “harmonic” which may interfere with details or harmonics present in the image source, which eliminates the occurrence of moiré patterns and the need for application of image processing to remove moiré patterns. Sensors are non-uniformly spaced along a first axis according to a predetermined, deterministic and predictable schema or function. Sensors are sampled during scanning according a non-uniform function in order to realize a non-uniform sampling scheme in a second dimension. Linear interpolation is applied to the non-uniformly spaced data set, synthesizing a uniformly-spaced data set for use in common imaging formats and processing.
摘要:
A method and apparatus for adaptively targeting advertisements to a specific client computer from a server within a distributed data processing system is provided. As a user of the client browses the World Wide Web, the material that is downloaded to the client constitutes a datastream. At some location during the routing of the datastream, either on the server or at the client, the datastream is scanned to generate a list of keywords that are present within the datastream. The datastream may be analyzed in real-time or cached and analyzed on a delayed basis. The generated list of keywords represents a summary of the content that appears to be the focus of interest of the user. The keywords are compared against a database of advertisements, and the server selects an advertisement that matches the user's area of interest in comparison to the analysis of the user's browsing history. The selected advertisement is then inserted into the datastream to be routed to the client. In consideration for viewing targeted advertisements and to entice a Web viewer to allow the monitoring of a datastream so that targeted advertisements may be placed into the datastream, a Web viewer may receive online connection service for free, for a reduced cost, at a premium level of service, or for other some other value, such as frequent viewer credits that may be exchanged for goods and services.
摘要:
Systems, methods and media for utilizing electronic document usage information are disclosed. More particularly, hardware and/or software utilizing electronic document usage information to respond to user search requests with search engines are disclosed. Embodiments include receiving a search request from a requesting user and receiving document utilization information associated with one or more electronic documents, where the document utilization information provides an indication of the usage of the electronic documents by one or more users. Further embodiments include generating search results based at least partially on the search request and the document utilization information and transmitting an indication of the search results to the requesting user. Further embodiments include generating statistical information regarding the search results for electronic documents and transmitting the generated statistical information.
摘要:
The present invention relates to a method and system for expiring a device after a predetermined time period has elapsed. A device, which contains its own internal time cell, is designed to stop working or self-destruct after a predetermined time period has expired. The device uses its own time cell so that the elapsed time period is not altered through an external time source. After the predetermined time period has elapsed, the device or a component of the device self-destructs when connected to a power source.
摘要:
A system manipulates molecules using a set of proximal probes such as those used in atomic force microscopes. An electrostatic pattern is placed on a set of proximal probes such that each proximal probe may exert an electrostatic force. A molecule is captured using those electrostatic forces, after which the molecule can be manipulated while the molecule remains captured by the proximal probes. The electrostatic pattern can be modified such that the molecule moves and/or rotates over the set of proximal probes while the molecule remains captured by the set of proximal probes. The electrostatic pattern can be used to bend or split the molecule while the molecule remains captured by the set of proximal probes, thereby allowing the system to engage the molecule in chemical reactions, e.g., to act as a synthetic catalyst or a synthetic enzyme.
摘要:
The present invention provides for a method for software development. A first computer program code written in a programming language is received for analysis. The first computer program code is analyzed for at least a programming error. If at least one programming error is found, correction suggestions are generated based on the detected programming error. The correction suggestions are displayed to a user for input from the user. The first computer program code is modified in response to the user input.
摘要:
A method and system for balancing server work load for cellular phone client-proxy applications in an environment where the clients change position within a given geographic area is disclosed. The method comprises the steps of mapping, monitoring, automatically re-mapping the system when required, updating a map address book, and updating a client address book. The system has a mapping system and a communication system connected to a plurality of servers, proxy servers and applications by an internal network. The proxy servers are connected to a plurality of clients by the Internet. If a threshold is exceeded, the monitoring program sends a message to a mapping program. Upon receipt of the message, the mapping program uses a rules engine to calculate a new map graph to remove load from an overloaded server (or servers) and to adjust communication requirements for data by reconfiguring partitions.
摘要:
The present invention allows the user (author or creator) of a document to specify that certain portions of a document be selected for encryption while other portions of the document remain displayed as created. In addition, each encrypted section could have multiple encryption keys such that some viewers can review certain parts of the document while other viewers will not have that same access. The user could employ a standard word processing editor technique to highlight (or swipe) portions of a document that the user desires to be encrypted. The highlighted portion would then be ‘tagged’ with a surrounding attribute indicating to the word processor that this highlighted portion of the document is to be encrypted. The highlighted sections would also have encryption keys associated with the highlighted and encrypted section. Any one of the encryption keys for that section would decrypt that section. With proper authorization, any encrypted portion of a document would be displayed as part of the document. Without proper authorization, the display of the document would only contain the unencrypted portions of the document.
摘要:
A method and implementing system are provided for enabling the carrying of a portable computer or similar electronic device along with one or more accessory devices in a single package which uses an accessory device to form a handle by which the electronic device may be carried. In one example, an AC power adapter cord is embedded within a carrying strap and the computer is designed to use attachment devices for securing the carrying strap around the computer casing. The carrying strap is also used to form a handle for carrying the portable computer and the AC power adapter cord together as a single package. In another embodiment, the carrying strap is “U” shaped and comprised of a series of sections to fit snugly around the outside edge of a laptop computer. In another example, a computer security cable is used in a similar manner to form a handle for carrying the computer together with the security cable. In another example, the AC power adapter cord is modified to act as a security cable for the portable computer and is also designed to form a carrying handle for the computer when the computer is being carried.
摘要:
The present invention relates to a method and system for expiring a device after a predetermined time period has elapsed. A device, which contains its own internal time cell, is designed to stop working or self-destruct after a predetermined time period has expired. The device uses its own time cell so that the elapsed time period is not altered through an external time source. After the predetermined time period has elapsed, the device or a component of the device self-destructs when connected to a power source.