摘要:
A method of encouraging a user to be active with respect to a game networking system on a particular day is disclosed. An event is detected on the game networking system. A newsworthiness of the event to the user is determined. An action that the user is likely to want to perform on the game networking system in response to receiving information pertaining to the event is determined. A notification is generated that includes the information pertaining to the event and information pertaining to the action. The notification is sent to the user.
摘要:
This disclosure relates generally to systems integration testing (SIT), and more particularly to dynamic java message service emulator. In one embodiment, non-transitory computer-readable medium storing computer-executable trend analysis instructions is provided. The instructions may include instantiating, via one or more hardware processors, a dynamic enterprise java bean. The instructions may also include receiving, via the one or more hardware processors, a request at the dynamic enterprise java bean. The instruction may include generating, via the one or more hardware processors, a query for business rules based on the request. Additionally, the instructions may include configuring, via the one or more hardware processors, the dynamic enterprise java bean using the business rules. The instructions may further include processing, via the one or more hardware processors, the request using the configured dynamic enterprise java bean to generate a response.
摘要:
A method of removing fog from the images/videos independent of the density or amount of the fog and free of user intervention and a system for carrying out such method of fog removal from images/videos are disclosed. The removal of fog from images and video involve airlight estimation and airlight map refinement based restoration of foggy images and videos. Advantageously, removal of fog from images and videos of this invention would require less execution time and yet achieve high perceptual image quality with reduced noise and enhanced contrast. The proposed method is adapted for RGB Color model and advantageously also for HSI color model involving reduced computational requirements and be user friendly and supposed to have wide application and use.
摘要:
The invention relates to a new method and system for detection and removal of rain from video using temporal/spatiotemporal properties. Advantageously, the temporal/spatiotemporal properties are involved to separate the rain pixels from the non-rain pixels. It is thus possible by way of the present invention to involve less number of consecutive frames, reducing the buffer size and delay. It works only on the intensity plane which reduces the complexity and execution time significantly along with accurate rain detection. This new technique does not assume the shape, size and velocity of the raindrops which makes it robust to different rain conditions. This method reduces the buffer size which reduces the system cost, delay and power consumption while maintaining sufficient quality of rain detection.
摘要:
Methods and apparatus to change control contexts of controllers are disclosed. An example apparatus includes a touch screen to display a user interface; a controller to control a first physical playback device of a first zone when in a first control context and to control a second physical playback device of a second zone when in a second control context; a swipe detector to monitor a designated area of a user interface for a swipe of the touch screen; and a context changer to change the controller from operating in the first control context to operating in the second control context in response to a detected swipe.
摘要:
A method and a system for testing memory blocks using a built-in-self-test (BIST) block using a regeneration mechanism. The method includes generation of a test pattern by executing a pre-defined algorithm to test a memory address of a memory block. The test pattern is stored at the memory address, and then the stored data is read from the memory address. The read data is send to a comparator for comparison with a background data. The background data corresponds to the test pattern and is regenerated by a regeneration block corresponding to clock cycles taken for storing the test pattern in the memory address. The stored data is read from the memory address. The comparator generates a validity signal based on the comparison of the background data with the read data.
摘要:
Learning to, and detecting spam messages using a multi-stage combination of probability calculations based on individual and aggregate training sets of previously identified messages. During a preliminary phase, classifiers are trained, lower and upper limit probabilities, and a combined probability threshold are iteratively determined using a multi-stage combination of probability calculations based on minor and major subsets of messages previously categorized as valid or spam. During a live phase, a first stage classifier uses only a particular subset, and a second stage classifier uses a master set of previously categorized messages. If a newly received message can not be categorized with certainty by the first stage classifier, and a computed first stage probability is within the previously determined lower and upper limits, first and second stage probabilities are combined. If the combined probability is greater than the previously determined combined probability threshold, the received message is marked as spam.
摘要:
A wireless node in a wireless network examines data packets directed to itself (i.e., value in destination address field indicates that the wireless node is an intended recipient)for presence of anomalies that suggest intrusion. The data packet is examined as part of the normal course of operation of the node. Upon detection of an anomaly, the wireless node sends a message packet containing details of the anomaly to a sentinel device. The sentinel device processes the anomalies to determine if a possibility of intrusion is indicated, and activates a spy routine in the wireless node. The spy routine enables further investigation into the intrusion. As components (such as wireless nodes) in the wireless network operate normally (normal operations) until an anomalous condition/event occurs, the additional power requirements for intrusion detection are reduced. If intrusion is detected, appropriate actions, such as alerting an operator, are taken to mitigate the intrusion.
摘要:
Embodiments are described herein that provide a media playback system controller with multiple graphical interfaces. In one aspect, a method is provided that involves (a) causing a graphical display to provide a first graphical interface including at least (i) a first input region and (ii) a first representation of a media item, (b) receiving a first input data indicating a selection within the first input region, (c) based on the received first input data, causing the graphical display to provide a second graphical interface including at least (i) an active region, (ii) an inactive region, and (iii) a second representation of the media item, (d) receiving a second input data indicating a selection within the active region, and (e) based on the received second input data, causing the graphical display to provide one or more media playback controls.
摘要:
Methods of communicating location information from a subscriber to a repeater are described. The subscriber switches from a working channel to a data revert channel, transmits a request for a periodic or one-time window to transmit an update, and determines from grant information in the response announcement the allocated window and frame before switching back to the working channel. Before the allocated time, the subscriber switches to the data revert channel, confirms whether it remains scheduled to transmit the update from a repeater announcement, and if so transmits the location update in either the current or reserved window. The announcements from the repeater contain the identity of the next window and frame and the subscriber reserved to use the window in addition to grant information. The subscribers may or may not be time-aligned and the data and data revert channels may or may not be synchronized.