摘要:
Containers such as shopping carts and shopping baskets take advantage of fraud detection systems in place with RFID cash registers in stores. The weight of the container is obtained when entering the store and the weight of the shopped articles is correlated with the list of the articles detected by the RFID reader of the cash register. Recognizing a particular container in the store is done using RFID technology with an RFID tag integrated in the structure of the container. The RFID tag can also contain information such as the weight, size, color, type, form, etc. of container.
摘要:
A method and associated system for authenticating an end user. A selected subset of root nodes of a set of root nodes in a server mask is received, the selected subset of root nodes having been selected by the end user. In response to the receiving of the selected subset of root nodes, the end user is authenticated by determining that the spatial location in the server mask of each root node of the selected subset of root nodes matches a spatial position of a corresponding root node of a server set of transparent root nodes in the server mask, wherein the server set of transparent root nodes are a result of a first random selection of root nodes from the set of root nodes in the server mask.
摘要:
There is disclosed a method and system for resizing a digital image wherein a RGB image is converted into an YCbCr image (Y, Cb, Cr planes). Thereafter, a discrete cosine transform (DCT), followed by a specific inverse cosine transform (IDCT) is performed on each row/column of the Y, Cb, Cr planes. The mentioned specific operation corresponds to a type of homothetic matrix, which dimensions are defined by a scaling factor. In order to produce a scaled image, the scaled Y, Cb, Cr images are transformed to an RGB image for display.
摘要:
A system and a method for loading a called class file table with data indicating a highest version of a class file of a software application are provided. The method includes retrieving a first class version dependency file associated with a first class file, having both a first class name and a first version number associated with a second class file that is called by the first class file. The method further includes adding a first record to the called class file table having both the first class name and the first version number associated with a second class file, and retrieving a second class version dependency file associated with a third class file. The second class version dependency file has both a second class name and a second version number associated with a fourth class file called by the third class file. The method further includes if the second class name is identical to the first class name in the called class file table and the second version number is higher than the first version number, then updating the first record in the called class file table with the second class name and the second version number.
摘要:
There is disclosed a method and system for resizing a digital image wherein a RGB image is converted into an YCbCr image (Y, Cb, Cr planes). Thereafter, a discrete cosine transform (DCT), followed by a specific inverse cosine transform (IDCT) is performed on each row/column of the Y, Cb, Cr planes. The mentioned specific operation corresponds to a type of homothetic matrix, which dimensions are defined by a scaling factor. In order to produce a scaled image, the scaled Y, Cb, Cr images are transformed to an RGB image for display.
摘要:
A masterless time slot allocation technique that collaboratively synchronizes, at a time slot level, devices communicating in an ad hoc network. Responsive to determining a current time slot allocated to a first device is occurring, the first device transmits a map to the other devices. The map includes an allocation of time slots to the devices, including indicators for whether each time slot is free, busy or overbooked, devices that own the time slots, and how recently information associated with each time slot was updated. After receiving the map, a second device determines a conflict in which the same time slot is allocated to the second device and to another device. The conflict is resolved by allocating another time slot to the second device and the result of resolving the conflict is each slot is allocated to no more than one device.
摘要:
The present invention is directed to reading short distance emission RFID tags to locate items in a container. A method in accordance with an embodiment of the present invention includes: receiving, by a plurality of first RFID tags, a signal broadcast by an RFID reader, the signal initiating a reading sequence of the plurality of first RFID tags, wherein each first RFID taq is associated with a respective item located in the container, and wherein each first RFID tag emits an identification (ID); capturing the ID emitted by each first RFID tag using a plurality of second RFID tags located in a vicinity of the first RFID tag, wherein the IDs emitted by the first RFID tags are not captured by the RFID reader; the RFID reader interrogating the plurality of second RFID tags to obtain the captured IDs; and determining a physical location of an item in the container based on the captured IDs.
摘要:
A method and system to selectively secure the display of advertisements on web browsers. A method in accordance with an embodiment includes: defining a particular displayed area of the interpreted markup file; obtaining the DOM tree of the interpreted markup file, the DOM tree comprising parent and child nodes, each node being associated with displayable elements; identifying in the DOM tree a set of child nodes whose displayable elements comprise the particular displayed area; identifying in the DOM tree a first parent node comprising the set of child nodes; converting displayable elements associated with the identified first parent node to an image; generating a second parent node comprising the image; and modifying the DOM tree into a modified DOM tree by deleting the identified set of child nodes and by replacing the identified first parent node by the second parent node.
摘要:
A method for utilizing system lag to send facts to an end user. The method begins by monitoring a computer system to identify said system lag. After identifying system lag, the method determines an estimated length of the system lag, the estimated length being a measurement of time. The estimated length takes into account previously identified system lag lengths to better approximate the current system lag length. After determining the estimated length of the system lag, the method sends a fact to the end user during the system lag. The fact sent to the end user has a length equal to or less than the estimated length of the system lag. Finally, the method stores the actual length of the system lag in order to improve subsequent determinations of the estimated length.
摘要:
A transponder, a method for powering the transponder, and a system relating to the method. The transponder includes at least two electrical coils, a dipole antenna, and a chip electrically connected to the dipole antenna and the electrical coils, wherein the electrical coils surround the dipole antenna and the chip. The transponder is surrounded with a wiring loop. An alternating current is generated in the wiring loop. The alternating current generates a magnetic field at the electrical coils. The electrical coils receive energy from the magnetic field and transfer the received energy to the chip for powering the transponder. The dipole antenna is configured to transmit an output signal to a reader and to receive an input signal from the reader.