Abstract:
A counterfeit identification performance attribute (SIPA) sensitivity to changes in resolution of the image for features of an image is determined. The CIPA sensitivity for the features is used to choose at least one feature to determine whether the image on a sample is a counterfeit.
Abstract:
Functional summarization of non-textual content based on a meta-algorithmic pattern is disclosed. One example is a system including a converter, a plurality of summarization engines and/or meta-algorithmic patterns, an extractor, and an evaluator. The converter converts the non-textual content into a plurality of tokens. Combinations of summarization engines and/or meta-algorithm patterns are applied to the plurality of tokens to provide a meta-summary. The extractor extracts at least one summarization term from the meta-summary, and at least one class term for each given class of a plurality of classes of non-textual content. The evaluator determines similarity values of the non-textual content over each given class, each similarity value indicative of a similarity between the at least one summarization term and the at least one class term for each given class. The selector selects a class of the plurality of classes, the selecting based on the determined similarity values.
Abstract:
A system for generating an incrementally completed security mark includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object; computer readable code for selecting a number of steps in a workflow associated with the carrier object and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas. The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
Abstract:
In various disclosed examples, an identifier is selected from a first set of identifiers, the selected identifier having a representation of at least two different characters. An indication of a difference between the representation of the selected identifier and representations of one or more identifiers from a second set of identifiers is calculated, and the selected identifier is determined to be an eligible identifier if the indication of the difference satisfies a threshold criteria.
Abstract:
An example apparatus may include a processor and a memory device including computer program code. The memory device and the computer program code may, with the processor, cause the apparatus to provide modified serialization codes for a first entity in a serialization flow to replace existing serialization codes for the first entity. In various examples, the modified serialization codes may have a representation of at least two different characters, and a number of instances of one of the characters in the representation of the modified serialization codes may be different from a number of instances of the one of the characters in the representation of the existing serialization codes. The memory device and the computer program code may further cause the apparatus to receive serialization codes from a second entity, the second entity being downstream in the serialization flow from the first entity; compare serialization codes from the second entity with the modified serialization codes; and verify the serialization codes from the second entity by determining if the serialization codes from the second entity are compatible with the modified serialization codes.
Abstract:
Examples disclosed herein relate to keyword determination. In one implementation, a processor determines a summary of a text and identifies a keyword related to the text based on a comparison of the summary of the text to the remaining portion of the text. The processor may output the identified keyword.
Abstract:
One example is a system including a plurality of summarization engines, an evaluator, and a selector. Each of the plurality of summarization engines receives content to provide a summary of the content. The evaluator determines a value of each summary for a selected task. The selector selects a summarization engine for the selected task based on the assessed value of each summary.
Abstract:
An example apparatus may include a processor and a memory device including computer program code. The memory device and the computer program code may, with the processor, cause the apparatus to receive serialization codes for a first entity in a serialization flow; compare serialization codes for the first entity to serialization codes for a second entity, the second entity being either upstream or downstream of the first entity in the serialization flow; and validating the serialization codes from the first entity by determining if the serialization codes for the first entity are compatible with the serialization codes for the second entity in the serialization flow.
Abstract:
One example is a system including a plurality of combinations of summarization engines and/or meta-algorithmic patterns used to combine a plurality of summarizers, an extractor, an evaluator, and a selector. Each of the plurality of combinations of summarization engines and/or meta-algorithmic patterns receives content to provide a meta-summary of the content. The extractor generates a collection of search queries based on the content. The evaluator determines a similarity value of each combination of summarization engines and/or meta-algorithmic patterns for the collection of search queries. The selector selects an optimal combination of summarization engines and/or meta-algorithmic patterns based on the similarity value.
Abstract:
A system for generating an incrementally completed security mark includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object; computer readable code for selecting a number of steps in a workflow associated with the carrier object and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas. The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.