摘要:
A system and method for establishing a burstiness metric is presented including at least one processor and a computer-readable storage medium in communication with the at least one processor, wherein the computer-readable storage medium comprises one or more programming instructions for performing the steps of: receiving information related to a plurality of tasks performed by a plurality of electronic devices based on input received from one or more users; analyzing the received information; employing an availability model to the information analyzed; and generating a schedule based on the information analyzed and the availability model by redistributing at least one task of the plurality of tasks between the plurality of electronic devices in accordance with electronic device availability and computational loads. Also, an assessment is made based on the information analyzed to determine a proportion of the plurality of tasks to be supported to achieve a required quality of service.
摘要:
An automated method and system for retrieving documents based on highlighted text from a scanned source. Documents that are stored within a multifunction device can be searched and retrieved using highlighted text as keyword. The search of such documents can further be extended towards other networked multifunction devices and also to retrieve information available on the Internet using highlighted text as a uniform resource locator pointer. The matched documents and their respective details are then displayed on a graphical user interface which provides the user with multiple actions to be taken with respect to the documents.
摘要:
Systems and methods are described that facilitate determining an original document format for a scanned document by analyzing a bitmap thereof. Text objects are extracted from the document, binarized, and segmented to identify text. Page orientation and text size are used to distinguish between a slideshow-type document, and a word processing or spreadsheet-type document. To further distinguish between the word processing and spreadsheet types, text column structure and count is analyzed.
摘要:
What is disclosed is a resizing method that utilizes segmentation information to classify objects found within a document and then selects the most appropriate resizing technique for each identified object. The present method employs readily available document parsers to reliably extract objects. e.g. text, background, images, graphics, etc., which compose the document. Information obtained from a document parser is utilized to identify the document components for classification. The extracted objects are then classified according to their object type. Each of classified objects are then resized using a resizing technique having been pre-selected for the object type based on their respective abilities to resize certain types of document content over other resizing techniques. The present method advantageously extends smart or content-based scaling and is especially useful for N-up or variable-information printing. The present method finds its intended uses in enhancing N-up and handout options currently provided in a variety of print-drivers.
摘要:
An exemplary device for allocating revenue among providers of products that are offered together for purchase as part of a unit includes a processor that is configured to automatically determine a number of unit or offering purchases. The processor is configured to automatically issue a corresponding number of virtual shares to each of the providers. The number of virtual shares issued to each provider is based on the number of unit or offering purchases and a predetermined allocation of a number of virtual shares for each provider, respectively for each purchase. The processor is also configured to determine a value of each issued virtual share using at least one selected revenue sharing rule according to a determined schedule. A virtual share redemption module facilitates payment responsive to redemption of issued virtual shares at the determined value.
摘要:
A method and system for group call control in a broadband wireless network. A group call (push-to-talk) server initiates and regulates group call communication sessions. A wireless base station communicates with one or more group call participants. When a request to participate in a group call is received, it is examined to see if it contains a group call ID or other group call indicator. If not, regular call resources are allocated, if available. If so, it is determined whether another group member is attached to the base station. Group call resources are then reserved, if available, based on this determination. The resources allocated for the group call may also depend on whether the system supports multicast on the downlink to group members, or whether losing audio is supported. In some embodiments, network resources may be reallocated to support the group call.
摘要:
One embodiment is a method for suppressing background inaccuracies in binary to grayscale image conversion. A binary image is converted to a grayscale image using a neighbor map. An image enhancement function is applied to the grayscale image to suppress background inaccuracies in the grayscale image. Another embodiment is method for converting a binary pixel of a binary image to a grayscale pixel of a grayscale image and suppressing noise in the grayscale image using selective filtering of the binary image. Another embodiment is a method for converting a binary image to a first grayscale image and suppressing noise in the first grayscale image to produce a noise suppressed grayscale image using selective filtering of the first grayscale image.
摘要:
Systems and methods are described that facilitate encrypting document status information into a scanned image of a document using a mixed raster content document parsing protocol, in accordance with various features described herein. A text string comprising status information can be imaged into a mask layer that overlays the scanned image. Additionally or alternatively, the text string can be encrypted into a binary image that is encoded into the mask layer and overlaid on the image. The image itself is parsed into a background layer and one or more mask layers comprising different portions of the document. The encrypted mask layer comprising the text string and/or binary image can be generated using the same color as the background layer, such that the document status information is invisible and does not cause unwanted artifacts during printing or conversion of the document between formats. The document status information can be scanner signature information, scan-to-file authentication information, object metadata, etc.
摘要:
What is disclosed is a resizing method that utilizes segmentation information to classify objects found within a document and then selects the most appropriate resizing technique for each identified object. The present method employs readily available document parsers to reliably extract objects. e.g. text, background, images, graphics, etc., which compose the document. Information obtained from a document parser is utilized to identify the document components for classification. The extracted objects are then classified according to their object type. Each of classified objects are then resized using a resizing technique having been pre-selected for the object type based on their respective abilities to resize certain types of document content over other resizing techniques. The present method advantageously extends smart or content-based scaling and is especially useful for N-up or variable-information printing. The present method finds its intended uses in enhancing N-up and handout options currently provided in a variety of print-drivers.
摘要:
Present systems and methods provide for adaptive job-size prediction that can enable the user of a scan-to-export function to obtain continuing feedback as original documents are being scanned, regarding the transferability of a scanned and processed data file. The compression method that is selected to process a scanned image is used to predict the output size for the associated data and to provide an estimated size for the job. The estimated size of the data being prepared for output is compared to the amount of storage space that is available at the target device and if the estimate exceeds available space, a signal is generated to terminate the scan or take other appropriate action. The user is also immediately notified if the transfer will fail for other reasons, such as the entry of an invalid target destination address or invalid user authentication.