Abstract:
A transaction medium comprises a non-e-paper portion and a passive e-paper display portion to display a first expression of an authentication element in a secure representation. The first expression is related to a second expression of the authentication element, wherein a comparison of the first expression and the second expression determines authentication.
Abstract:
Functional summarization of non-textual content based on a meta-algorithmic pattern is disclosed. One example is a system including a converter, a plurality of summarization engines and/or meta-algorithmic patterns, an extractor, and an evaluator. The converter converts the non-textual content into a plurality of tokens. Combinations of summarization engines and/or meta-algorithm patterns are applied to the plurality of tokens to provide a meta-summary. The extractor extracts at least one summarization term from the meta-summary, and at least one class term for each given class of a plurality of classes of non-textual content. The evaluator determines similarity values of the non-textual content over each given class, each similarity value indicative of a similarity between the at least one summarization term and the at least one class term for each given class. The selector selects a class of the plurality of classes, the selecting based on the determined similarity values.
Abstract:
Examples disclosed herein relate to classifying paper based on three-dimensional characteristics of the paper. For example, a representation of the three-dimensional characteristics of the paper may be created, and statistical summary information related to the three-dimensional characteristics of the paper may be determined based on the representation. The paper may be classified based on the statistical summary information.
Abstract:
Techniques related to data stream traffic control are disclosed herein. A bit equivalent entropy of an anonymized data stream is computed. Traffic of the data stream is controlled based on the value of the bit equivalent entropy.
Abstract:
A system for generating an incrementally completed security mark includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object; computer readable code for selecting a number of steps in a workflow associated with the carrier object and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas. The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
Abstract:
A system includes a plurality of summarization engines, each summarization engine to receive video content, via a processing system, and to provide a summary of the video content, thereby providing a plurality of summaries of the video content. The system includes a plurality of meta-algorithmic patterns, each meta-algorithmic pattern to be applied to at least two of the summaries to provide, via the processing system, a meta-summary of the video content using the at least two summaries, thereby providing a plurality of meta-summaries of the video content. The system includes an evaluator to evaluate the plurality of summaries and the plurality of meta-summaries and to determine similarity measures of the video content over each given class of a plurality of classes of video content, and to select a class of the plurality of classes based on the determined similarity measures.
Abstract:
Examples disclosed herein relate to item identifier assignment. For example, a processor may create a mass serialization scheme to provide a list of item identifiers to allow a subset of the identifiers to be knocked out. Each item identifier may associated with multiple containers, and each container may include two item identifiers relating to the sequence of item identifiers included within the container.
Abstract:
Examples herein disclose multiple engines to produce output representative of a summary of document produced by each of the multiple engines. The examples apply a weighting mechanism to the output specific to that engine to obtain a value corresponding to that output. The examples identify specialized language if the value corresponding to that output reaches at least a particular threshold.
Abstract:
The present disclosure is drawn to a particulate build material for three-dimensional printing. The particulate build material can include a plurality of particulates, wherein individual particulates include a particulate core having a photosensitive coating applied to a surface of the particulate core. The particulate core includes a metal, a ceramic, or both a metal and a ceramic. The photosensitive coating includes a polymer having a photosensitive agent suspended or attached therein.
Abstract:
Examples disclosed herein relate to transmitting an authentication mark. For example, a processor creates an authentication mark for a two factor authentication system. The authentication mark is created according to data represented by a data bearing image. The processor transmits via a network the authentication mark to a computing device.