Abstract:
Described is a paid search advertising technology in which advertisements associated with bidding keywords are ranked by relevance when returning one or more advertisements in a response to a query. A relevance score is computed for an advertisement based on the bidding keyword and page data (text and/or other page content) of the advertisement. The relevance score may be based on a similarity vector score computed from a keyword vector and page data vector relationship, combined with a proximity score computed from the keyword's bigram set and the page data bigram set. When a query is received, advertisements are selected based on the proximity of the query to each advertisement's bidding keyword, providing candidate scores. Each candidate score is modified (e.g., multiplied) into a final score based on its respective advertisement's relevance score. The final scores are then used to re-rank the advertisements relative to one another.
Abstract:
Described is a paid search advertising technology in which advertisements associated with bidding keywords are ranked by relevance when returning one or more advertisements in a response to a query. A relevance score is computed for an advertisement based on the bidding keyword and page data (text and/or other page content) of the advertisement. The relevance score may be based on a similarity vector score computed from a keyword vector and page data vector relationship, combined with a proximity score computed from the keyword's bigram set and the page data bigram set. When a query is received, advertisements are selected based on the proximity of the query to each advertisement's bidding keyword, providing candidate scores. Each candidate score is modified (e.g., multiplied) into a final score based on its respective advertisement's relevance score. The final scores are then used to re-rank the advertisements relative to one another.
Abstract:
A leak detection system and method of use thereof is disclosed based on shock wave propagation in a fluid. In one form, the system includes at least one shock wave generator for introducing at least one shock wave signal into a fluid medium; at least one detector for detecting signals in the fluid medium; and at least one processor configured to identify excitation signals in the fluid medium caused by the at least one shock wave signal, wherein the identification of excitation signals is indicative of a fluid leak.
Abstract:
Systems, methods, and computer-readable media for dynamically generating text associated with an advertisement are provided. Core text associated with an advertisement is received from an advertiser, as is at least one attribute relevant to the advertiser and/or a user. Based upon the received attribute(s), it is determined whether customization of the core text is desired. If customization is desired, the core text is modified and presented in association with the advertisement. If customization is not desired, the core text is presented in association with the advertisement. In one embodiment, target advertisement placement information may also be utilized to determine whether customization of the core text is desired.
Abstract:
A system for processing a video signal into a processed video signal includes a pattern recognition module for detecting a region of text in the image sequence based on coding feedback data and generating pattern recognition data in response thereto. A video codec generates the processed video signal and generates the coding feedback data in conjunction with the processing of the image sequence.
Abstract:
A solid electrolyte for a lithium-ion battery including a film having a multiplicity of nanowires, each nanowire including a lithium-ion conductive material, and a lithium-ion battery including the solid electrolyte. The multiplicity of nanowires may be formed in an electrospinning process. The lithium-ion battery may be formed by compressing the solid electrolyte between an anode layer and a cathode layer.
Abstract:
The present invention provides an N-substituted isopropyldimethyl azulene sulfonamide derivative as represented by formula (I), and preparation method and uses thereof, wherein R1 is an alkyl, cycloalkyl, alkenyl, alkynyl, aryl, heteroaryl, amino, or a substituted alkyl, cycloalkyl, alkenyl, alkynyl, aryl, heteroaryl, and amino. The N-substituted isopropyldimethyl azulene sulfonamide derivative can be used in treating gastric ulcer.
Abstract:
A method and system for handling working of a Low Duty Cycle (LDC) mode of one or more Base Stations (BS) in a wireless communication network. The method includes defining one or more LDC patterns based plurality of LDC parameters associated with one or more BS where the plurality of LDC parameters includes an active period, an inactive period and a start frame offset of the one or more BS in the wireless communication network. The method then sends the one or more LDC patterns notifying Available Interval and Unavailable Interval of each of the one or more patterns to a Mobile Station (MS) by broadcasting one or more LDC patterns, unicasting the one or more LDC pattern to the MS, multicasting the one or more LDC pattern to a group of MSs or send the one or more LDC patterns to one or more MS in a pre-provisioned way.
Abstract:
A system and method for identifying the accessibility of a base station in a communication system. The system includes at least one Closed Subscriber Group (CSG)-Open (hybrid) base station. The base station can apply a base station identifier, such as a CSG identifier, as a cyclic redundancy check (CRC) mask to a first broadcast channel communication and can include the base station identifier in the payload of, or as a CRC mask applied to, a second broadcast channel communication. A mobile station can determine from the base station identifier in the first broadcast communication if the mobile station is a member authorized closed access to the base station. The mobile station can determine from the base station identifier in second first broadcast communication if the mobile station is a non-member authorized open access to the base station.
Abstract:
A method, apparatus and computer program product for performing authorization control in a cloud storage system. The method comprises: receiving an access request to a file block, wherein the file block is embedded with tag data comprising at least file block authorization information; retrieving the file block; extracting the file block authorization information from the tag data; determining whether the access request matches the file block authorization information; and performing the access request if the access request matches the file block authorization information. Effective authorization control may be performed in a cloud storage system.