摘要:
Search tree structures with nodes that represent signatures derived from segments of video and audio content are used by systems to identify content and re-establish the correct alignment between video and audio content that have become disassociated with one another. The amount of storage needed to record data representing the tree structure can be reduced by replacing stored signature sets with signature pointers. The efficiency of searches in the tree structure can be improved by constructing and using partial tree structures.
摘要:
Described is an electro-optical apparatus and method for correcting myopia that includes at least one adaptive lens, a power source, and an eye tracker. The eye tracker includes an image sensor and a processor operatively connected to the adaptive lens and the image sensor. The processor is configured to receive electrical signals from the image sensor and to control the correction power of the adaptive lens to correct myopia, with the correction power dependent on a user's gaze distance and myopia prescription strength. A lower-power-consumption method of eye glint tracking is further described.
摘要:
Attributes are identified in media content. A classification value of the media content is computed based on the identified attributes. Thereafter, a fingerprint derived from the media content is stored or searched for based on the classification value of the media content.
摘要:
Content identification and quality monitoring are provided. The method involves obtaining a first fingerprint derived from a first media content, processing the first media content to generate a second media content, obtaining a second fingerprint derived from the second media content, and comparing the first fingerprint and the second fingerprint to determine one or more of: a similarity between the first fingerprint and the second fingerprint that indicates that the second media content is generated from the first media content or a difference between the first fingerprint and the second fingerprint to identify a quality degradation between the first media content and the second media content.
摘要:
Derivation of a fingerprint includes generating feature matrices based on one or more training images, generating projection matrices based on the feature matrices in a training process, and deriving a fingerprint for one or more images by, at least in part, projecting a feature matrix based on the one or more images onto the projection matrices generated in the training process.
摘要:
A receiver monitoring the transmissions of a packet processing device such as a wireless access point analyzes the monitored transmissions to estimate the probability of packet loss due to buffer overflow in the processing device. The loss probability can be estimated for individual packets to follow rapid changes in communication conditions. An indication of the estimated loss probability can be used to adapt the forward error correction (FEC) parameters that are used to generate the packets, thereby improving the reliability of data delivery to a receiver while optimizing the use of communication channel bandwidth.
摘要:
The loss of packets in a communication system can be minimized in an optimal manner by adapting a set of error correction (EC) parameters in response to a calculated probability of packet loss. The calculated probability is obtained from derived algorithms that are applied to a set of communication parameters. Algorithms are derived from Bernoulli-distributed traffic models and constant bit rate (CBR) traffic models of the communication system. A collapsed-state model is used to derive a very efficient algorithm that calculates an approximate probability of packet loss. Alternate applications for the algorithms are also disclosed.
摘要:
A value is computed for a feature in an instance of query content and compared to a threshold value. Based on the comparison, first and second bits in a hash value, which is derived from the query content feature, are determined. Conditional probability values are computed for the likelihood that quantized values of the first and the second bits equal corresponding quantized bit values of a target or reference feature value. The conditional probabilities are compared and a relative strength determined for the first and second bits, which directly corresponds to the conditional probability. The bit with the lowest bit strength is selected as the weakbit. The value of the weakbit is toggled to generate a variation of the query hash value. The query may be extended using the query hash value variation.
摘要:
Techniques for re-associating dynamic metadata with media data are provided. A media processing system creates, with a first media processing stage, binding information comprising dynamic metadata and a time relationship between the dynamic metadata and media data. The binding information may be derived from the media data. While the first media processing stage delivers the media data to a second media processing stage in a first data path, the first media processing stage passes the binding information to the second media processing stage in a second data path. The media processing system re-associates, with the second media processing stage, the dynamic metadata and the media data using the binding information.
摘要:
Content identification and quality monitoring are provided. The method involves obtaining a first fingerprint derived from a first media content, processing the first media content to generate a second media content, obtaining a second fingerprint derived from the second media content, and comparing the first fingerprint and the second fingerprint to determine one or more of: a similarity between the first fingerprint and the second fingerprint that indicates that the second media content is generated from the first media content or a difference between the first fingerprint and the second fingerprint to identify a quality degradation between the first media content and the second media content.