摘要:
A method of modeling symbol sequence generation is obtained which allows the probability of symbol sequences to be estimated. The model involves treating symbols as if they are emitted as a point travels through an abstract space called a continuity map (CM), in which each position in the space has associated probabilities of emitting each of the possible symbols. This method for modeling symbol generation, combined with methods for estimating the probability of symbol sequences given smooth paths through the CM, can be applied to such problems as language modeling and anomaly/fraud detection. A fraud detection study is described that demonstrates that the invention can be used for detecting medical fraud.
摘要:
An apparatus, system, and method are disclosed for detecting tampering of devices such as fiscal printers. A memory module includes a volatile memory that stores multi-bit data. An operation module allows operation of an electronic device, such as a fiscal printer, in response to determining that the predefined multi-bit data is stored in the volatile memory. A detection module detects an attempt to access the enclosed device where access to the enclosed device is restricted by an enclosure. A tamper switch module disconnects power to the volatile memory such that the predefined multi-bit data stored in the volatile memory is erased in response to the detection module detecting an attempted access to the enclosed device. A shutdown module disables operation of the electronic device in response to determining that the predefined multi-bit data is not stored in the volatile memory.
摘要:
The exemplary embodiments of the method and system according to the present invention provide a system and method for controlling access to audiovisual content such as television shows, video-on-demand services or streaming video which can be delivered by cable, satellite, wired or wireless networks, cell phones, the Internet, etc. More particularly, the present invention provides a capability to define certain criteria which can be used to restrict access to content based on combinations of various parameters including, but not limited to, time of day, day of the week, type of content, source of content, content display device, etc. These criteria may also be provided by data storage arrangements or a network, and access restrictions specified by such criteria can be associated with a plurality of display devices.
摘要:
Efficient opaque metal conductors extending across the light receiving surface of a time delay and integration scanning array, are arranged at an angle to the array so as to make their interference with light, projected onto the array, substantially uniform. An anamorphic lens distorts the image projected onto the array to enable more convenient and efficient use of the array surface area.
摘要:
A two-dimensional history of reflectance values, from which black-white threshold decisions are made, is stored in a relatively small amount of memory. Updating of the history by non-linear functions is accomplished through the use of look-up tables.
摘要:
Fluorescent bulbs having two phosphors emitting different colors with different persistence are used to illuminate a target object with sequentially different predetermined mixtures of light from which color separated images can be taken.
摘要:
Thermoplastic compositions having miscible and compatible immiscible polymer blends are disclosed. The miscible polymer blends have a single glass transition temperature. The compatible polymer blends have two glass transition temperatures.
摘要:
A data source on a main local area network (LAN) transmits broadcast messages via bridges to remote stations. A ring buffer in a bridge on the main LAN buffers a selected number of packets received from the data source. When the main bridge on the main LAN receives a "Lost Frame Message" from a remote bridge, not on the main LAN, the main bridge backs up to the address of the lost packet in the ring buffer, and retransmits the lost packet and then continues sequential transmission of subsequent packets. If buffer is, filled above a pre-set criteria, retransmission is slowed or stopped until buffer is mostly emptied.
摘要:
An image population having a large number of attributes is processed to form a display population with a predetermined smaller number of attributes which represent the larger number of attributes. In a particular application, the color values in an image are compressed for storage in a discrete lookup table (LUT) where an 8-bit data signal is enabled to form a display of 24-bit color values. The LUT is formed in a sampling and averaging process from the image color values with no requirement to define discrete Voronoi regions for color compression. Image color values are assigned 8-bit pointers to their closest LUT value whereby data processing requires only the 8-bit pointer value to provide 24-bit color values from the LUT.
摘要:
An interface device called an adapter is provided for interconnecting data terminal equipment (DTE) to a communication highway. The adapter includes a plurality of command/status registers coupled through a decoding device to the data bus and control lines of a microprocessor. An Internal Modem Interface (IMI) circuit arrangement monitors the decoding device and command/status registers and depending on the contents of the command/status registers and/or the status of the signals on the interface the IMI enables/disables the receive and transmit logic functions of the adapter. The adapter also includes a circuit arrangement which monitors traffic or signals on the data highway without affecting the electrical characteristics of the traffic.