摘要:
In an image-data processing system, as would be found in a digital copier or scanner, a relatively quick calculation is performed to estimate a compression ratio or compression time resulting from applying a compression algorithm to an image data set. If the estimated compression ratio or compression time is determined to be unfavorable, the system is advised not to apply the compression algorithm. The method can also be used to select a type of compression algorithm, such as CCITT G4 or JBIG2, according to the requirements of the larger system.
摘要:
A background detection process that analyzes background information for the purpose of limiting the impact of intensity information obtained from non-document areas includes: identifying a first white peak from pixels within a first document region; identifying a second white peak from pixels within a second document region; determining if the first white peak was identified using image data from outside of the input document; and if so, identifying a third white peak from pixels within the first document region based on the second white peak.
摘要:
An image processing system receives image input terminal information and image output terminal information. Based on the content of the image input terminal information and the image output terminal information a new system tone reproduction curve is determined. This device independent methodology allows system tone reproduction curves to be generated as needed, and allows the additional flexibility for changes in the image input terminal or the image output terminal.
摘要:
A system and method for selective scaling of an image by selective implementation of a window averaging processing technique or an interpolation processing technique. For enlargement scaling, the interpolation processor is implemented. For reduction scaling, the window averaging processor is implemented. For anamorphic scaling, the window averaging processor may be selected and implemented for reduction processing pursuant to a two-pass processing technique wherein the interpolator processing will be implemented thereafter. Image tags are provided for selective scaling of each area of an image according to the type of content of each area by selective implementation of a window averaging processing technique or an interpolation processing technique. The interpolation processor is implemented for line drawing areas of an image, and the window averaging processor is implemented for contone areas of the image. For anamorphic scaling with image tags, a two-pass system is provided which performs a first-pass reduction in one direction followed by a second-pass enlargement in the remaining direction, wherein the reduction is performed in the manner described for reduction scaling. A one-pass system is also provided which provides a second serially connected interpolator so that the aforementioned reduction can be performed on one dimension in a first step, followed by enlargement in the remaining direction in a following step on the same pass.
摘要:
In a switch fabric environment, which includes a buffer, packet data of different class-types from different sources is received, stored in the buffer, processed and outputted to its intended destination. As the buffer fills up, transmission from some of the data sources is stopped to avoid dropping of packets. To avoid packet loss, when the occupancy of the buffer reaches a first threshold value, further transmission of a first-class type of data is precluded from the particular source of that data then being received, while transmission from other sources of that same first-class type of data is not precluded from these other data sources until first-class type of data from such other sources is also received. Further, data of a second-class type is not precluded from being transmitted as long as the amount of data stored in the buffer remains below a second threshold, which is greater than the first threshold. When the occupancy of the buffer reaches that second threshold, further transmissions from the particular source of that second-class type of data then being received is also precluded. As data from other sources of that second-class type of data is received, further transmissions from those other sources are also precluded. A third-class type of data, however, is not precluded from transmission as long as the amount of data remains below a third threshold value, which is greater than the second threshold value. In order to avoid packet loss, when a packet from any source is received, it is stored regardless of whether transmission from the source of that packet has been precluded. Advantageously, a MAX/MIN distribution of the available bandwidth can be probabilistically achieved without packet loss.
摘要:
A method for determining a restoration path for a new service in a mesh network involves selecting between candidate restoration paths corresponding to a primary path for the new service based on the shared-risk link groups (SRLGs) associated with links in the primary path. The method includes, for each of a plurality of candidate restoration paths associated with the primary path, (1) determining whether the primary path requires any additional restoration bandwidth to be reserved on any link of the restoration path based on whether, for each link of the restoration path, the primary path is SRLG-disjoint from each other primary path that is protected by that link, (2) generating a path cost for the restoration path, where the path cost is a function of whether any additional restoration bandwidth is required; and (3) selecting the restoration path for the new service based on the path cost.
摘要:
An automated method for extracting highlighted regions in a scanned text documents includes color masking of highlight regions, extracting text from highlighted regions, recognizing the characters in extracted text optically and inserting the recognized characters to new document in order to easily identify highlighted text in scanned images. Using a two-layer multi-mask compression technology configured in a scanned export image path, edges and text regions can be extracted and together with the use of mask coordinates and associated mask colors, all highlighted texts can be easily identified and extracted. Optical Character Recognition (OCR) can then be utilized to appropriate summarization of different extracted highlighted texts.
摘要:
A method and system for group call control in a broadband wireless network. A group call (push-to-talk) server initiates and regulates group call communication sessions. A wireless base station communicates with one or more group call participants. When a request to participate in a group call is received, it is examined to see if it contains a group call ID or other group call indicator. If not, regular call resources are allocated, if available. If so, it is determined whether another group member is attached to the base station. Group call resources are then reserved, if available, based on this determination. The resources allocated for the group call may also depend on whether the system supports multicast on the downlink to group members, or whether losing audio is supported. In some embodiments, network resources may be reallocated to support the group call.
摘要:
A compression and storage device comprises: a compressor configured to compress data; a central processing unit (CPU) configured to control storage of the compressed data and to perform at least one additional task; an electronic memory organized as storage blocks each having a storage block size; a direct memory access (DMA) engine configured to operate autonomously from the CPU to transfer a current transfer block of compressed data into one or more storage blocks of the electronic memory; and a transfer block size estimator configured to select a transfer block size for the current transfer block based on previous DMA transfers of compressed data, the selected transfer block size being generally different from the storage block size.
摘要:
Various deficiencies in the prior art are addressed by embodiments for recommending applications to users. A method and apparatus are provided for selecting an application to recommend to a user based on user profile information associated with the user and application profile information associated with the application, and propagating recommended application information toward a user device of the user, where the recommended application information includes an application executable of the recommended application. A method and apparatus are provided for receiving, at a user device, recommended application information comprising an application executable of an application recommended for a user of the user device, and automatically installing the application executable on the user device.