摘要:
A handwritten test symbol, such as an alphabetic character, a word or a signature, written on a digitizing tablet is normalized by comparison with a model symbol to determine the transformation necessary to best fit the test symbol to the model symbol. Such transformation is then applied to normalize the test symbol. Shape information in the test symbol is preserved during such normalization. In accordance with one aspect of the invention, the model symbol is a line segment. In accordance with another aspect of the invention, the model symbol is an example of the symbol being normalized. Such normalization can be used as a preprocessing step in applications such as character recognition, text recognition or signature verification.
摘要:
An unknown handwritten symbol written on a digitizing tablet is compared with symbols in a predefined "alphabet" or library of model symbols and the closest match chosen. Recognition is independent of the size, position or orientation of the symbols. The alphabet can be any collection of symbols, such as alphanumeric characters, ideograms or words in cursive script and is created by writing at least one example of each symbol on the tablet. A sequence of samples of the pen position is recorded while a symbol is being written. The samples form a vector, which is then translated so that the centroid of the symbol lies at an origin. The comparison, which can easily be done in real time, involves calculating a correlation factor from scalar products of the vector for the unknown symbol and two versions of the vector for each model symbol and choosing the model symbol having the highest correlation factor. If needed to distinguish between model symbols with similar correlation factors, the comparison can also include calculating a rotation factor from such vectors for use in making such choice. Embodiments of the invention can be configured that are user-independent, user-dependent or that evolve from one to the other.
摘要:
The backup-in-the-middle primary-backup configuration is created by placing a backup-in-the-middle forwarder in the routing path between the primary and the environment. The backup-in-the-middle forwarder intercepts output messages along with required state information sent by the primary to the environment. The backup-in-the-middle forwarder backs up the primary by updating its state information and forwards the output packets to the environment.
摘要:
A method for recognizing a table structure from delineated table region in an electronic document using hierarchical clustering of data strings. The cluster groupings are segregated effectively using the distances from a positional vector associated with words and groups of words rather than a minimum number of blank spaces between words. Once a data tree of the hierarchical clusterings is constructed, the tree is scanned downward from the root to find appropriate column boundaries using a columnization algorithm. Then using successive heuristic algorithms, determine column and row headers and row boundaries.
摘要:
Methods and apparatus are provided with improved routing techniques for bifurcated flows. Routing methods and apparatus are provided that obtain a fractional flow from a set of nodes to a given destination having a maximum load, L, on any link between a node in the set and the given destination; and generate a bifurcated flow between the set of nodes and the given destination from the fractional flow such that the maximum load on any link in the bifurcated flow does not exceed 2L, wherein the bifurcated flow allows a flow from a given node to be sent on at most two outgoing links. The fractional flow can be, for example, a fractional single-sink multicommodity flow.
摘要:
Undirected cross connects are provided based on wavelength-selective switches. An undirected Cantor network is disclosed where the switch nodes are wavelength selective switches. An undirected Clos cross connect is also disclosed where one or more undirected switches are undirected Cantor networks having at least one wavelength selective switch.
摘要:
Undirected cross connects are provided based on wavelength-selective switches A demand d={i, j} is routed over a path pd between ports i and j in a multi-layer network based on one or more wavelength selective switches, by determining a middle layer node n in the multi-network for which there is a first path pi between the port i and the middle layer node n and a second path pi between the port j and the middle layer node n; identifying a node n′, wherein the node n′ is a first node starting from port i that path pi shares with path pj; and concatenating the path pd comprised of a subpath pi′ of the first path pi from the port i to the node n′ with a subpath of p′j of the second path pi from the node n′ to the port j. An undirected Cantor network is disclosed where the switch nodes are wavelength selective switches. An undirected Clos cross connect is also disclosed where one or more undirected switches are undirected Cantor networks having at least one wavelength selective switch
摘要翻译:基于波长选择性交换机提供非定向交叉连接基于一个或多个在多层网络中的要求d = {i,j}在多层网络中的端口i和j之间的路径p sub>上路由 波长选择性交换机,通过确定在端口i和中间层节点n之间存在第一路径p i i i i i的多网络中的中间层节点n和第二路径p < 在端口j和中间层节点n之间的i SUB> 识别节点n',其中节点n'是从端口i开始的第一节点,路径p i与路径p分享; 并且从端口i将包括第一路径p i i i i i的子路径p N SUB>的路径p SUB>从节点n'连接到节点n' 从节点n'到端口j的第二路径p i i i i的子路径p' SUB>。 公开了一种无向Cantor网络,其中交换节点是波长选择性交换机。 还公开了一种无向Clos交叉连接,其中一个或多个无向开关是具有至少一个波长选择开关的无向Cantor网络
摘要:
Methods and apparatus are provided with improved routing techniques for bifurcated flows. Routing methods and apparatus are provided that obtain a fractional flow from a set of nodes to a given destination having a maximum load, L, on any link between a node in the set and the given destination; and generate a bifurcated flow between the set of nodes and the given destination from the fractional flow such that the maximum load on any link in the bifurcated flow does not exceed 2L, wherein the bifurcated flow allows a flow from a given node to be sent on at most two outgoing links. The fractional flow can be, for example, a fractional single-sink multicommodity flow
摘要:
The backup-in-the-middle primary-backup configuration is created by placing a backup-in-the-middle forwarder in the routing path between the primary and the environment. The backup-in-the-middle forwarder intercepts output messages along with required state information sent by the primary to the environment. The backup-in-the-middle forwarder backs up the primary by updating its state information and forwards the output packets to the environment.
摘要:
A primary-backup replication capability is disclosed. A primary process and a backup process participate in a synchronization process configured to synchronize state information of the primary and backup processes. The synchronization process operates in periods of time referred to as epochs. During the current epoch, the primary process computes state update information representing changes to the state information of the primary process since a previous epoch, and also buffers output messages generated during the current epoch in an associated output buffer dedicated for use in the current epoch. The primary process initiates a new epoch independent of receiving, from the backup process, a state update acknowledgement for the previous epoch. The output messages buffered for the current epoch are released from the associated output buffer after the primary process receives a state update acknowledgment for the current epoch and all output buffers of all previous epochs are empty.