Abstract:
A method for making an authenticating system for a package includes establishing a plurality of variable instruments on the package and depositing a product in the package after the instruments have been established thereon. The method also includes acquiring information from at least two of the plurality of instruments, and associating the acquired information with the product to render product-specific authentication data.
Abstract:
A method for classifying regions defined within a digital image includes defining a tessellated set of regions from a plurality of regions identified by a plurality of segmented versions of the digital image and then classifying each tessellated region according to a likelihood that the tessellated region contains text.
Abstract:
Disclosed are methods of refining the region boundaries for individual negatives or slides when scanning a plurality of negative or slides, including the defining of rows and columns based on the median spacings between regions, and the median spans of the regions, in the vertical and horizontal directions; and aligning the identified negative or slide regions to the defined rows and columns. The negative or slide regions may then be ordered to conform to the ordering represented on the scanning adapter.
Abstract:
A method of creating a virtual lead associated with a physiological recording is provided. The method can include obtaining a first physiological signal from a first lead having a first angle and a second physiological signal from a second lead having a second angle, the first lead and the second lead being associated with a subject. The method can also include transforming the first and second physiological signals into a vector representation of the first and second physiological signals and transforming the vector representation to a virtual physiological signal representing a virtual lead having a virtual lead angle.
Abstract:
A method, apparatus, and system are disclosed for tuning software engines. In one exemplary embodiment, a method for software execution includes activating copies of an un-tuned software engine capable of generating a solution domain to a given input; tuning a first un-tuned software engine to generate a first subset of the solution domain in response to the given input; and tuning a second un-tuned software engine to generate a second subset of the solution domain in response to the given input.
Abstract:
A method for implementing a secure printing campaign to thwart counterfeiting is provided. The method includes the steps of selecting a first secure print technology and a second secure print technology that is distinct from the first secure print technology, selecting a first secure print variable for the first secure print technology and a second secure print variable for the second secure print technology, and establishing a first plurality of discrete values for the first secure print variable and a second plurality of discrete values for the second secure print variable.
Abstract:
Disclosed are systems and methods for scanning media. In one embodiment, a system and a method pertain to scanning a platen at a relatively low resolution using a dedicated preview image sensor, and pre-processing image data obtained through the scanning of the platen to automatically determine settings to apply during a subsequent final scan.
Abstract:
A color image processor is configured to locate at least two zones within a document. Within the zones, content types are recognized, wherein the content types may include: text and lines; graphic images; photographic images; and background. A color rendering intent is applied to each of the at least two zones based on the content type within the zone. The zones are then merged into an image.
Abstract:
A system and method for deploying a document classification system include deploying a document classification system with a first classification engine configuration, and thereafter, automatically redeploying the document classification system with a second classification engine configuration in response to a cost function.
Abstract:
A system for distinguishing a package includes a plurality of identifiers, where at least one of the identifiers is intentionally non-functional. The system also includes an identifier indicator that indicates the identity of the at least one of the identifiers that is intentionally non-functional. In addition, the identifier indicator is stored on at least one of the package and a database and is accessible by a user to authenticate the package.