摘要:
Transformation matrices describing the motion of an articulated reference object specify translations of the reference object and/or its articulated parts, and are relative to the origin of the object's coordinate system. During the real-time animation process, a connection matrix is saved to represent the current transformation status of the animated object. This connection matrix being obtained by continuously concatenating an external transformation (if any) with the next animation step. This process allows efficient insertion of external transformations (e.g., resulting from operating real-time interactive user controls). Use of absolute transformations to develop the connection matrix allows a first animation sequence to be interrupted at any arbitrary point and immediately, smoothly followed by a second animation sequence (e.g., walking can be interrupted at any time and turned into running, jumping, etc.).
摘要:
A data hiding system and method for providing a method of embedding multiple layers of hidden data into multimedia data. First, a media unit of the multimedia data is evaluated to determine an appropriate embedding procedure. Next during a first embedding pass, a ruling layer of primary hidden data is embedded into the media unit. In another embedding pass, a governing layer of secondary hidden data is embedded on top of the ruling layer. The secondary hidden data provides control information for controlling the primary hidden data and the host data. Control information such as error correction data, synchronization data, decoding data, and authentication data is embedded in the governing layer. Embedding schemes such as base domain and spectrum domain embedding are employed.
摘要:
A scintillation-crystal based gamma-ray detector with photon sensors disposed on edge surface(s) of the crystal to take advantage of total internal reflection of scintillation photons within the thin-slab detector substrate to improve spatial resolution of determination of a scintillation event (including depth-of-interaction resolution) while preserving energy resolution and detection efficiency. The proposed structure benefits from the reduced—as compared with related art—total number of readout channels elimination of need in complicated and repetitive cutting and polishing operations to form pixelated crystal arrays used in conventional PET detector modules. Detectors systems utilizing stacks of such detectors, and methods of operation of same.
摘要:
Systems and methods for performing a task via a simple code. Combination of a unique marker and a simple code represents a task. A simple code is submitted manually or by a voice input. Voice recognition and gesture recognition are used. In an aspect, a task is executed when a voice input comprises a predetermined name and a simple code. In another aspect, a task is executed when a voice input comprises a simple code and a user gazes or gestures at a device.
摘要:
Method, system, and programs for online advertising are disclosed. One or more targets associated with an entity are identified based on a first piece of information related to each target and a second piece of information related to the entity. The one or more targets are considered as likely being interested in content that can be made available by the entity. A connection is established between the entity and each identified target through a bi-directional communication channel. Activities between the entity and each target through the bi-directional communication channel are monitored. The entity delivers the content to an identified target through the bi-directional communication channel established between the entity and the identified target. In response to the delivered content, the identified target is able to provide a feedback to the entity through the bi-directional communication channel.
摘要:
Approaches for handling network resources in a virtualized computing environment. A first request for network resources is received from a first virtual machine. Policy data is consulted to determine how to service the first request. The first request is processed by providing the first virtual machine with access to only a first portion of network resources. A second request for network resources is received from a second virtual machine. Policy data is consulted to determine how to service the second request. The second request is processed by providing the second virtual machine with access to only a second portion of network resources that is not coextensive with the first portion. In this way, virtual machines may have access to particular resources and/or specific bounded areas of a network.
摘要:
A provisioning machine may receive a request that an application be executed while distributed according to a distribution constraint among various devices. The provisioning machine may access a topological model that represents multiple devices configured as a single cloud-based application server and defines a first group of devices that have the same redundancy status (e.g., active or backup). In addition, the topological model may define a second group of devices that have the same functional role (e.g., executing a particular component of the application). A device may be a member of both the first group and the second group. The provisioning machine may determine a size of the first group according to the distribution constraint. Based on the determined size of the first group, the provisioning machine may configure (e.g., provision) the first group of devices as a subset of the multiple devices of the server.
摘要:
Techniques are described herein for automatic generation of a title or summary from a long body of text. A grammatical tree representing one or more sentences of the long body of text is generated. One or more nodes from the grammatical tree are selected to be removed. According to one embodiment, a particular node is selected to be removed based on its position in the grammatical tree and its node-type, where the node type represents a grammatical element of the sentence. Once the particular node is selected, a branch of the tree is cut at the node. After branch has been cut, one or more sub-sentences are generated from the remaining nodes in the grammatical tree. The one or more sub-sentences may be returned as a title or summary.
摘要:
A computerized system and method for identifying one or more cryptographic operations from software code, comprising: performing processing associated with identifying, one or more cryptographic operations in the software code, the software code being run on a processor; and performing processing associated with identifying a boundary for each cryptographic operation in the software code.
摘要:
The present invention relates to an acrylamide compound of Formula I, or an isomer, pharmaceutically acceptable salt and solvate thereof, to a composition comprising the compound or an isomer, pharmaceutically acceptable salt and solvate thereof, and a pharmaceutically acceptable carrier, excipient or diluent, and to a use of the compound or the composition for prophylaxis and/or treatment of a disease or disorder associated with cardiomyocyte apoptosis.