Abstract:
An apparatus, system, and method are disclosed for identifying a target object. An object detection module detects objects by matching data from one or more sensors to known data of a target object and determining one or more correlation metrics for each object. An object tracking module tracks geographic locations for detected objects over time using subsequent data from the one or more sensors. A contextual data module determines one or more contextual indicators for detected objects based on the data from the one or more sensors. An artificial intelligence module estimates probabilities that detected objects comprise the target object based on the correlation metrics, the geographic locations, the contextual indicators, and one or more target contextual indicators associated with the target object. The artificial intelligence module estimates the probabilities using an artificial intelligence model, such as a Bayesian network.
Abstract:
The invention is systems and methods for transferring items with restricted transferability. Initially, the systems and methods wait for a first consumer to make a request to transfer an item after having purchased the item from a provider. The systems and methods then send a request to transfer the item to the provider. This request may indicate inducements to the provider to authorize the transfer. If the transfer is authorized, the systems and methods then present information regarding the item to other consumers. This information may be presented as part of a bidding interface or as part of an advertising interface. Once the second consumer submits a winning bid for the item when the information is presented in a bidding interface, or an acceptable offer when the information is presented in an advertising interface, the transfer of the item can then be completed with or without the assistance of an intermediary. When the transfer is completed without the assistance of an intermediary, the first and second consumer may directly transfer the item and payment to each other. When the transfer is completed with the assistance of an intermediary, the first consumer may send the item to the intermediary and the second consumer may send payment to the intermediary. Once both the item and the payment have been received at the intermediary, the intermediary may send the item to the second consumer and all or part of the payment to the first consumer.
Abstract:
Systems and methods for electronic trading that provide incentives to users of a trading system. The systems and methods may monitor a trading activity of the user and determine that the orders submitted by the user over a period of time exceed a first pre-determined threshold. Systems and methods also determine that a spread of the plurality of orders exceeds a second pre-determined threshold. Based on these determinations, the user is designated as qualifying for a special status, which entitles the user to incentives in trading. Systems and methods apply the incentives to an order submitted by the user. One such incentive provides the user with a priority in a trading queue, where orders submitted by the user are executed in advance of other orders in the trading queue.
Abstract:
There are provided a system, a method and a computer program product for tracking an inventory distribution of a perishable product in a supply chain. The system receives shipment data and point of sale data for the product from every location in the supply chain. The system creates, based on the obtained shipment data and the point of sale data, a network graph that represents a flow of the product in the supply chain. The system identifies an age of unsold inventory of the product at each node of the graph based on the created graph. The system provides a notification to a user at each location that informs the age of the unsold inventory of the product at that location.
Abstract:
A breakout wrench for use with a rock drill string includes a frame adapted for mounting to a rock drill feed guide structure, and a sub-frame rotatably connected to the frame about a drill string longitudinal axis. The sub-frame supports a pair of jaw members adapted for radial movement towards and away from one another and to releasably engage a first section of a drill string. The breakout wrench also includes a clamping member supported by the rock drill feed guide structure. The clamping member is adapted to releasably engage a second section of the drill string spaced axially from the first section.
Abstract:
Disclosed is a processor-implemented method for processing images. The processor receives image data of a color space defined by input provided to a system by a user, determines at least one color attribute of the pixels in the received image correlating to at least perceptual image characteristics, determines statistics using the attribute(s), and analyzes the statistics to classify the image into a category. Based on at least the category, a billing structure for the image is determined. For example, chroma and/or hue of pixels can be used to create histograms, whose data is used to determine a degree of color and/or content of an image, which is categorized. Color space components of received pixels can also be statistically analyzed. Such determinations consider billing based on human perception of use of color. Billing for color images in this manner satisfies the user and increases use of color output (e.g., printing).
Abstract:
A multi-directional structural joint for interconnecting the ends of tubular structural pipes that contains a base member having rigid intersecting perpendicular planar plates of circular or polygonal shape where each of the plates terminate in a peripheral edge on which are fixedly mounted a plurality of radially positioned and spaced apart cylindrical connecting studs, where the longitudinal axis of each stud is coplanar with the plate on which it is mounted.
Abstract:
An integrated circuit (IC) chip having repeaters for propagating signals along relatively long wires that extend between and among lower-level physical blocks of the IC chip, wherein the repeaters are implemented as clocked flip-flops (or “repeater flops”). A method for automatically inserting and allocating such repeater flops during the logical and physical design of the IC chip is also provided.
Abstract:
A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.
Abstract:
A method and system for repairing photomasks is disclosed. A scanning electron microscope (SEM) is used to identify, measure, and correct defects. The SEM is operated in multiple modes, including a measuring mode and a repair mode. The repair mode is of higher landing energy and exposure time than the measuring mode, and induces shrinkage in the photoresist to correct various features, such as vias that are too small.