Abstract:
An intelligent adaptive integrated learning environment to optimize the learning process to a particular user. The environment is capable of providing assessment and targeted feedback.
Abstract:
The present invention, in one embodiment, is a method on a server information processing system. The method begins with detecting, using software for automatically identifying object primitives, a plurality of objects (12) from a file with a primary multimedia presentation (14) without making changes to the primary multimedia presentation (14). Next a list of list of objects (16) detected in the primary multimedia presentation (14) is created for linking with a plurality secondary multimedia presentations. Identifiers (18) are layered in the primary multimedia presentation (14), without making changes to the file with the primary multimedia presentation (14), using a layering and scripting software application wherein the identifiers (18) have been matched with at least one of the objects (12) in the list of objects (16). The primary multimedia presentation (14) is presented to at least one viewer along with the identifiers (18) which have been layered. A user selection of at least one identifier (18) matched with at least one of the objects (12) in the list (16) causes a secondary multimedia presentation to be provided the user.
Abstract:
A steganographic message/advertisement embedding method is presented that can be used for contextual and targeted advertising supporting unobtrusive and on-demand message/advertisement delivery. The present invention presents over two client devices, the method includes receiving, on a first client device, a primary multimedia presentation with a plurality of steganographic codes embedded therein; whereby the steganographic code is not perceivable during a rendering of the multimedia presentation and the steganographic code is associated with at least one secondary multimedia presentation. Next; the primary multimedia presentation is rendered on the first client device. The first client device receives a user selection to select at least one of the steganographic codes. In response to the user selection, a secondary multimedia presentation is presented to the user in response to receiving the user selection, wherein the second multimedia presentation is presented over a second client device which is distinct from the first client device.
Abstract:
An apparatus is disclosed for permitting a mobile terminal having multiple, heterogeneous network connections (e.g., multiple wired or wireless transceivers of various types) to set up and maintain virtual connections over multiple networks to either the same or to multiple destinations. The mobile terminal can "load-share" traffic, i.e., it can distribute segments of traffic over a full set of heterogeneous networks, significantly improving the reliability and availability of communications. In a first embodiment, a mobile terminal is configured with multiple radio frequency (RF) transceivers. Operating system software is provided for dynamically establishing and maintaining traffic flow for user applications over multiple communications paths, and for automatically adapting to variations in the networking environment, application traffic flow requirements, end user preferences, or mobility. In a second embodiment, a software-defined radio is used to implement the physical layer protocols for each desired network, eliminating the need for multiple transceivers.
Abstract:
A product and process for extracting hidden data (2) from a stego-image (10') that has been subjected to scaling attacks are disclosed. The hidden data extraction method of the present invention retains the one-to-one mapping of the stego-image blocks to the corresponding blocks (18) in the scaled image. When the stego-image (10) is scaled down, the block size for extracting the hidden data (2) is reduced proportionally. When the stego-image (10) is scaled up, the block size for extracting the hidden data (2) is increased proportionally. The total overall number of blocks of pixels (18) to be examined is kept constant between the scaled image (10') and the stego-image (10). The hidden data extraction method can be combined with any existing block-DCT based data hiding method to provide an overall method for dealing with scaling attacks. Both the extraction method and the combined method can be implemented in software and stored within a machine-readable medium.
Abstract:
A method and apparatus for stabilizing glow plasma discharges by suppressing the transition from glow-to-arc includes a perforated dielectric plate having an upper surface and a lower surface and a plurality of holes extending therethrough. The perforated dielectric plate is positioned over the cathode. Each of the holes acts as a separate active current limiting micro-channel that prevents the overall current density from increasing above the threshold for the glow-to-arc transition. This allows for a stable glow discharge to be maintained for a wide range of operating pressures (up to atmospheric pressures) and in a wide range of electric fields include DC and RF fields of varying strength.
Abstract:
Methods useful for the manufacturing of microfluidic cells useful in electronics and other applications are disclosed. In this technique, an air cushioned pressure supplies the force to bond a membrane, which can be made from one or more of the sulfonated tetrafluoroethylene polymers commercially known as Nafion™ (i.e., proton exchange membranes) or from other thermoplastic substrates. A substrate is compressed and templated while it is simultaneously sealed inside the cell. The resultant microcells are strongly sealed while being patterned according to their application.
Abstract:
Three artificial intelligence (AI) linguistic processing architectures are proposed for early detection of Alzheimer's Disease based entirely on a patient's language abilities. Three C-Attention network architectures are presented: one that uses only PoS features, one that uses only the latent features (e.g., language embeddings) and a unified architecture, which uses both features.
Abstract:
A sensor apparatus for footwear includes at least one pair of light sources and at least one pair of light receivers, each light receiver being positioned and configured to receive light emitted from a respective one of the light sources. A pair of movable curtains functions to adjust the amount of light received by the pair of light receivers. The curtains are movable conjointly such that the amount of light received by one of the light receivers is inversely proportional to the amount of light received by the other light receiver.
Abstract:
A method for calculating camera poses and dense scene structure via probabilistic dense indirect visual odometry methods is disclosed. It may be used in various video analysis applications. Through use of a probabilistic model relating to the dependencies among camera movement, scene geometry and the input optical estimates, a generalized expectation maximization inference framework may be employed. The inference is build around an empirically validated error model for observation.