Abstract:
Techniques for classifying records in a dataset are described. The method includes identifying a set of features of a target record and assigning a scoring metric to each feature in the set of features. The method also includes processing the set of features based on the scoring metric to obtain a reduced subset of features and an expanded subset of features. The method also includes searching a store of electronic records using the reduced subset of features to obtain a reduced subset of electronic records. The method also includes searching the reduced subset of electronic records using the expanded subset of features to obtain a set of matching electronic records.
Abstract:
An example system includes an identifier reader to read a progressive identifier, a white space modification portion, and a controller. The progressive identifier includes white space and non-white space. The controller is to select portions of the white space to be changed to nonwhite space, and cause the white space modification portion to change the selected portions of the white space to non-white space. The amount of white space selected to be changed to nonwhite space is constant for all stages in the progression.
Abstract:
An apparatus stores a one-time pad key. Responsive to receiving local input from a user requesting a cryptographic key, via input hardware of the apparatus, the apparatus generates the requested cryptographic key from an unused portion of the one-time pad key. The apparatus provides the generated cryptographic key to a mobile device of the user, via output hardware of the apparatus.
Abstract:
In one example in accordance with the present disclosure, a method for assessing print quality is described. According to the method, a printed mark is converted into a digital binary mark. A number of values are calculated for the digital binary mark. The number of values include at least a perimeter length value and a value describing a characteristic of an intensity histogram for the digital binary mark. A combined representation of the number of values for the digital binary mark are compared against a combined representation of a number of values for a model printed mark. When the combined representation for the digital binary mark is greater than a predefined distance away from the combined representation for the model printed mark, an operation of a printing device that generated the printed mark is adjusted.
Abstract:
A crop sensor includes: a housing sized and shaped to correspond to a foodstuff of a crop; a sensor to sense a physiochemical parameter relative to growth of the crop; and an energy-harvesting unit to generate electrical energy for the sensor from movement of the housing.
Abstract:
An activatable SEL sensor stage may include a substrate, cation metal-based material masses supported by the substrate and isolated from one another and dielectric capping layer over the cation metal-based material masses to inhibit oxidation of the cation metal-based material masses.
Abstract:
Examples disclosed herein involve organizing training sequences for training courses. Examples disclosed include analyzing a profile of a user comprising a list of skills learned by the user, analyzing a curriculum of a training course comprising lessons, and organizing a training sequence of the lessons based on the profile and the curriculum.
Abstract:
A counterfeit identification performance attribute (CIPA) sensitivity to changes in resolution of the image for features of an image is determined (102). The CIPA sensitivity for the features is used to choose at least one feature to determine whether the image on a sample is a counterfeit (106).
Abstract:
A data leak prevention system includes an application, having source code that is unavailable or non-modifiable, resident on a client device. A system call is emittable by the application as a result of an action, and is to take place before a data leak event can occur. The action involves a document and i) latest full contents of the document, ii) metadata of the document, or iii) a combination of the latest full contents and the metadata. A system call interceptor agent is also resident on the client device. The interceptor agent includes a system call interceptor to intercept the system call emitted by the application and to suspend the system call. The system also includes a policy decision engine to analyze at least some of i) the latest full contents, ii) the metadata, or iii) the combination, and implement a policy action based upon the analysis.
Abstract:
The present disclosure includes a system and method for a serialized data service. A method for a serialized data service [801] includes retrieving serialized data to a data service [803], and augmenting the serialized data with information corresponding to one or more data retention policies [809]. The augmented serialized data is stored to a data source [811]. The augmented serialized data is removed from the data source based on the augmented information [813].